walkthrough guide

126
Walkthrough Guide revision 2.0 ePolicy Orchestrator ® A product overview and quick set up in a test environment version 3.6 McAfee ® System Protection Industry-leading intrusion prevention solutions

Upload: babusudhirb

Post on 18-Nov-2014

140 views

Category:

Documents


1 download

TRANSCRIPT

Page 1: Walkthrough Guide

Walkthrough Guiderevision 2.0

ePolicy Orchestrator®

A product overview and quick set up in a test environmentversion 3.6

McAfee® System ProtectionIndustry-leading intrusion prevention solutions

Page 2: Walkthrough Guide
Page 3: Walkthrough Guide

Walkthrough Guiderevision 2.0

ePolicy Orchestrator®

A product overview and quick set up in a test environmentversion 3.6

McAfee® System ProtectionIndustry-leading intrusion prevention solutions

Page 4: Walkthrough Guide

COPYRIGHTCopyright © 2005 McAfee, Inc. All Rights Reserved.

No part of this publication may be reproduced, transmitted, transcribed, stored in a retrieval system, or translated into any language in any form or by any means without the written permission of McAfee, Inc., or its suppliers or affiliate companies.

TRADEMARK ATTRIBUTIONSACTIVE FIREWALL, ACTIVE SECURITY, ACTIVESECURITY (AND IN KATAKANA), ACTIVESHIELD, CLEAN-UP, DESIGN (STYLIZED E), DESIGN (STYLIZED N), ENTERCEPT, EPOLICY ORCHESTRATOR, FIRST AID, FOUNDSTONE, GROUPSHIELD, GROUPSHIELD (AND IN KATAKANA), INTRUSHIELD, INTRUSION PREVENTION THROUGH INNOVATION, MCAFEE, MCAFEE (AND IN KATAKANA), MCAFEE AND DESIGN, MCAFEE.COM, MCAFEE VIRUSSCAN, NET TOOLS, NET TOOLS (AND IN KATAKANA), NETSCAN, NETSHIELD, NUTS & BOLTS, OIL CHANGE, PRIMESUPPORT, SPAMKILLER, THREATSCAN, TOTAL VIRUS DEFENSE, VIREX, VIRUS FORUM, VIRUSCAN, VIRUSSCAN, VIRUSSCAN (AND IN KATAKANA), WEBSCAN, WEBSHIELD, WEBSHIELD (AND IN KATAKANA) are registered trademarks or trademarks of McAfee, Inc. and/or its affiliates in the US and/or other countries. The color red in connection with security is distinctive of McAfee brand products. All other registered and unregistered trademarks herein are the sole property of their respective owners.

LICENSE INFORMATIONLicense AgreementNOTICE TO ALL USERS: CAREFULLY READ THE APPROPRIATE LEGAL AGREEMENT CORRESPONDING TO THE LICENSE YOU PURCHASED, WHICH SETS FORTH THE GENERAL TERMS AND CONDITIONS FOR THE USE OF THE LICENSED SOFTWARE. IF YOU DO NOT KNOW WHICH TYPE OF LICENSE YOU HAVE ACQUIRED, PLEASE CONSULT THE SALES AND OTHER RELATED LICENSE GRANT OR PURCHASE ORDER DOCUMENTS THAT ACCOMPANIES YOUR SOFTWARE PACKAGING OR THAT YOU HAVE RECEIVED SEPARATELY AS PART OF THE PURCHASE (AS A BOOKLET, A FILE ON THE PRODUCT CD, OR A FILE AVAILABLE ON THE WEB SITE FROM WHICH YOU DOWNLOADED THE SOFTWARE PACKAGE). IF YOU DO NOT AGREE TO ALL OF THE TERMS SET FORTH IN THE AGREEMENT, DO NOT INSTALL THE SOFTWARE. IF APPLICABLE, YOU MAY RETURN THE PRODUCT TO MCAFEE OR THE PLACE OF PURCHASE FOR A FULL REFUND.

AttributionsThis product includes or may include:

• Software developed by the OpenSSL Project for use in the OpenSSL Toolkit (http://www.openssl.org/). • Cryptographic software written by Eric A. Young and software written by Tim J. Hudson. • Some software programs that are licensed (or sublicensed) to the user under the GNU General Public License (GPL) or other similar Free Software licenses which, among other rights, permit the user to copy, modify and redistribute certain programs, or portions thereof, and have access to the source code. The GPL requires that for any software covered under the GPL which is distributed to someone in an executable binary format, that the source code also be made available to those users. For any such software covered under the GPL, the source code is made available on this CD. If any Free Software licenses require that McAfee pro-+34vide rights to use, copy or modify a software program that are broader than the rights granted in this agreement, then such rights shall take precedence over the rights and restrictions herein. • Software originally written by Henry Spencer, Copyright 1992, 1993, 1994, 1997 Henry Spencer. • Software originally written by Robert Nordier, Copyright © 1996-7 Robert Nordier. • Software written by Douglas W. Sauder. • Software developed by the Apache Software Foundation (http://www.apache.org/). A copy of the license agreement for this software can be found at www.apache.org/licenses/LICENSE-2.0.txt. • International Components for Unicode ("ICU") Copyright ©1995-2002 International Business Machines Corporation and others. • Software developed by CrystalClear Software, Inc., Copyright ©2000 CrystalClear Software, Inc. • FEADÆ OptimizerÆ technology, Copyright Netopsystems AG, Berlin, Germany. • Outside InÆ Viewer Technology ©1992-2001 Stellent Chicago, Inc. and/or Outside InÆ HTML Export, © 2001 Stellent Chicago, Inc. • Software copyrighted by Thai Open Source Software Center Ltd. and Clark Cooper, © 1998, 1999, 2000. • Software copyrighted by Expat maintainers. • Software copyrighted by The Regents of the University of California, © 1996, 1989, 1998-2000. • Software copyrighted by Gunnar Ritter. • Software copyrighted by Sun Microsystems, Inc., 4150 Network Circle, Santa Clara, California 95054, U.S.A., © 2003. • Software copyrighted by Gisle Aas. © 1995-2003. • Software copyrighted by Michael A. Chase, © 1999-2000. • Software copyrighted by Neil Winton, ©1995-1996. • Software copyrighted by RSA Data Security, Inc., © 1990-1992. • Software copyrighted by Sean M. Burke, © 1999, 2000. • Software copyrighted by Martijn Koster, © 1995. • Software copyrighted by Brad Appleton, © 1996-1999. • Software copyrighted by Michael G. Schwern, ©2001. • Software copyrighted by Graham Barr, © 1998. • Software copyrighted by Larry Wall and Clark Cooper, © 1998-2000. • Software copyrighted by Frodo Looijaard, © 1997. • Software copyrighted by the Python Software Foundation, Copyright © 2001, 2002, 2003. A copy of the license agreement for this software can be found at www.python.org. • Software copyrighted by Beman Dawes, © 1994-1999, 2002. • Software written by Andrew Lumsdaine, Lie-Quan Lee, Jeremy G. Siek © 1997-2000 University of Notre Dame. • Software copyrighted by Simone Bordet & Marco Cravero, © 2002. • Software copyrighted by Stephen Purcell, © 2001. • Software developed by the Indiana University Extreme! Lab (http://www.extreme.indiana.edu/). • Software copyrighted by International Business Machines Corporation and others, © 1995-2003. • Software developed by the University of California, Berkeley and its contributors. • Software developed by Ralf S. Engelschall <[email protected]> for use in the mod_ssl project (http:// www.modssl.org/). • Software copyrighted by Kevlin Henney, © 2000-2002. • Software copyrighted by Peter Dimov and Multi Media Ltd. © 2001, 2002. • Software copyrighted by David Abrahams, © 2001, 2002. See http://www.boost.org/libs/bind/bind.html for documentation. • Software copyrighted by Steve Cleary, Beman Dawes, Howard Hinnant & John Maddock, © 2000. • Software copyrighted by Boost.org, © 1999-2002. • Software copyrighted by Nicolai M. Josuttis, © 1999. • Software copyrighted by Jeremy Siek, © 1999-2001. • Software copyrighted by Daryle Walker, © 2001. • Software copyrighted by Chuck Allison and Jeremy Siek, © 2001, 2002. • Software copyrighted by Samuel Krempp, © 2001. See http://www.boost.org for updates, documentation, and revision history. • Software copyrighted by Doug Gregor ([email protected]), © 2001, 2002. • Software copyrighted by Cadenza New Zealand Ltd., © 2000. • Software copyrighted by Jens Maurer, ©2000, 2001. • Software copyrighted by Jaakko Järvi ([email protected]), ©1999, 2000. • Software copyrighted by Ronald Garcia, © 2002. • Software copyrighted by David Abrahams, Jeremy Siek, and Daryle Walker, ©1999-2001. • Software copyrighted by Stephen Cleary ([email protected]), ©2000. • Software copyrighted by Housemarque Oy <http://www.housemarque.com>, © 2001. • Software copyrighted by Paul Moore, © 1999. • Software copyrighted by Dr. John Maddock, © 1998-2002. • Software copyrighted by Greg Colvin and Beman Dawes, © 1998, 1999. • Software copyrighted by Peter Dimov, © 2001, 2002. • Software copyrighted by Jeremy Siek and John R. Bandela, © 2001. • Software copyrighted by Joerg Walter and Mathias Koch, © 2000-2002. • Software copyrighted by Carnegie Mellon University © 1989, 1991, 1992. • Software copyrighted by Cambridge Broadband Ltd., © 2001-2003. • Software copyrighted by Sparta, Inc., © 2003-2004. • Software copyrighted by Cisco, Inc and Information Network Center of Beijing University of Posts and Telecommunications, © 2004. • Software copyrighted by Simon Josefsson, © 2003. • Software copyrighted by Thomas Jacob, © 2003-2004. • Software copyrighted by Advanced Software Engineering Limited, © 2004. • Software copyrighted by Todd C. Miller, © 1998. • Software copyrighted by The Regents of the University of California, © 1990, 1993, with code derived from software contributed to Berkeley by Chris Torek.

PATENT INFORMATIONProtected by US Patents 6,470,384; 6,493,756; 6,496,875; 6,553,377; 6,553,378.

Issued September 2005 / ePolicy Orchestrator® software version 3.6 DBN-002-<EN>

Page 5: Walkthrough Guide

Contents

Walkthrough

1 Introduction 6Components of ePolicy Orchestrator. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 6

Policy, properties, and events . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 9

Policies. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 9

Properties . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 9

Events . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 9

Tasks, services, and accounts. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .10

Other times when credentials are needed . . . . . . . . . . . . . . . . . . . . . . . . . .11

Minimum requirements . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .11

2 Installing or Upgrading the Server 12Installing for the first time . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 12

Pre-installation preparation . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 13

Information to have during installation . . . . . . . . . . . . . . . . . . . . . . . . . . . 13

Upgrading from a previous version . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 15

Preparation . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 15

Information to have during the upgrade . . . . . . . . . . . . . . . . . . . . . . . . . . 16

Upgrading issues . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 17

3 Organizing the Directory and Repositories 18ePolicy Orchestrator Directory: concepts and roles . . . . . . . . . . . . . . . . . . . . . 18

About ePolicy Orchestrator roles. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .19

Organizing the Directory . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 21

Environmental borders. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 22

IP address filters and sorting . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 23

Repositories . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 25

Source repository . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 25

Fallback repository . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 25

Master repository . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 25

Distributed repository. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 26

4 Deploying the Agent and Products 28ePolicy Orchestrator agent . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 28

About the ePolicy Orchestrator agent . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 28

Agent installation folder. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 28

Agent language packages . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 29

The agent installation package . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 29

Agent-server communication . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 31

SuperAgents and broadcast wakeup calls . . . . . . . . . . . . . . . . . . . . . . . . . 32

Agent activity logs . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 34

Distributing agents . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 34

Deploying the agent from ePolicy Orchestrator. . . . . . . . . . . . . . . . . . . . . 35

Installing the agent with login scripts . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 37

Installing the agent manually . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 38

Enabling the agent on unmanaged McAfee products . . . . . . . . . . . . . . . . 38

Including the agent on an image. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 39

iii

Page 6: Walkthrough Guide

ePolicy Orchestrator®

3.6 Walkthrough Guide Contents

Distributing the agent using other deployment products . . . . . . . . . . . . . 39

Distributing the agent to WebShield appliances and Novell NetWare servers39

About deploying packages . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 40

Package signing and security. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 41

Legacy product support . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 42

Package ordering and dependencies . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 42

About deploying and updating products . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 42

Product deployment and updating process . . . . . . . . . . . . . . . . . . . . . . . . 42

Deployment task . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 43

Update tasks . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 43

Global updating . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 44

Pull tasks . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 45

Replication tasks . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 46

Repository selection . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 46

Repository selection by agents . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 47

Selective updating . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 47

About the SITELIST.XML repository list . . . . . . . . . . . . . . . . . . . . . . . . . . . 47

Checking in product deployment packages manually . . . . . . . . . . . . . . . . . . . 48

Configuring the deployment task to install products on client systems . . . . 49

5 Rogue System Detection 52The Rogue System sensor . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 52

Machine status and rogue type . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 55

Subnet status . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 56

Distributing Rogue System sensors . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 57

Deploying Rogue System sensors . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 57

Installing the sensor manually. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 58

Taking actions on detected rogue systems manually . . . . . . . . . . . . . . . . . . . 58

Configuring automatic responses for specific events . . . . . . . . . . . . . . . . . . . 59

6 ePolicy Orchestrator Notifications 61About Notifications . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 61

Throttling and aggregation . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 62

Notification rules and Directory scenarios . . . . . . . . . . . . . . . . . . . . . . . . . 63

Determining when events are forwarded . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 64

Determining which events are forwarded. . . . . . . . . . . . . . . . . . . . . . . . . . . . . 65

Planning . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 65

Rules. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 66

Configuring ePolicy Orchestrator Notifications . . . . . . . . . . . . . . . . . . . . . 66

Default rules . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 66

Creating rules . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 67

Viewing the history of Notifications . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 67

Notification summary. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 68

Notification list . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 68

Product and component list. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 70

7 Outbreaks 72Tasks to do on a daily or weekly basis to stay prepared . . . . . . . . . . . . . . . . . 72

Server and client tasks you should schedule to run regularly . . . . . . . . . 72

Checklist — Are you prepared for an outbreak? . . . . . . . . . . . . . . . . . . . . . . . . .74

Other methods to recognize an outbreak . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .74

Network utilization key indicators . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .74

E-mail utilization key indicators. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 75

Virus detection events . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 75

Checklist — You think an outbreak is occurring . . . . . . . . . . . . . . . . . . . . . . . . 75

iv

Page 7: Walkthrough Guide

ePolicy Orchestrator®

3.6 Walkthrough Guide Contents

Lab Evaluation

8 Installing and setting up 78Setting up a lab environment . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 79

Add systems to your Directory . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 85

Organize systems into groups for servers and workstations . . . . . . . . . . . . . 89

Configure the agent policy settings before deployment . . . . . . . . . . . . . . . . . 91

Deploy agents . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 92

Installing agent manually on client systems. . . . . . . . . . . . . . . . . . . . . . . . . . . 94

Add VirusScan Enterprise to the master repositor. . . . . . . . . . . . . . . . . . . . . y 95

Pull updates from McAfee source repository . . . . . . . . . . . . . . . . . . . . . . . . . . 96

Create a distributed repository . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 98

Create a shared folder on the system to use as a repository . . . . . . . . . . 98

Add the distributed repository to the ePolicy Orchestrator server. . . . . . 99

Replicate master repository data to distributed repository . . . . . . . . . . 101

Configure remote sites to use the distributed repository . . . . . . . . . . . . 101

Schedule a pull task to update master repository daily. . . . . . . . . . . . . . . . . 109

Schedule a replication task to update your distributed repository. . . . . . . . 110

Schedule a client update task to update DATs daily . . . . . . . . . . . . . . . . . . . 110

Use SuperAgents to wake up all agents on the network. . . . . . . . . . . . . . . . . 111

Convert an agent on each subnet into a SuperAgent . . . . . . . . . . . . . . . . . . . 112

Enable global updating on ePolicy Orchestrator server . . . . . . . . . . . . . . . . 113

9 Advanced Feature Evaluations 114ePolicy Orchestrator Notification . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 114

Rogue System Detection . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 118

v

Page 8: Walkthrough Guide

S E C T I O N 1

WalkthroughThis section provides a walkthrough of conceptual and best practices information.

Introduction

Installing or Upgrading the Server

Organizing the Directory and Repositories

Deploying the Agent and Products

Rogue System Detection

ePolicy Orchestrator Notifications

Outbreaks

Page 9: Walkthrough Guide

1 Introduction

ePolicy Orchestrator 3.6 is a powerful tool that allows you to manage security policy, assess and enforce policy, identify and take actions on rogue systems, and notify you of certain events that occur, all across your entire network.

Components of ePolicy Orchestrator.

Policy, properties, and events

Tasks, services, and accounts

Components of ePolicy OrchestratorePolicy Orchestrator is made up of several components that can reside on systems across your network:

ePolicy Orchestrator server.

Database server.

ePolicy Orchestrator consoles.

ePolicy Orchestrator agent.

Rogue System Detection (RSD) sensor.

Master repository.

6

Page 10: Walkthrough Guide

ePolicy Orchestrator® 3.6 Walkthrough Guide IntroductionComponents of ePolicy Orchestrator

1

Update repositories.

ePolicy Orchestrator serverThe center of your managed environment. One server can manage up to 250,000 systems, but you may be restricted by your bandwidth and other considerations. For example, network obstacles like firewalls and proxy servers, geographic locations of sites, and security divisions within your organization.

The server:

Delivers security policies.

Controls product and DAT file updates.

Processes events and serves tasks for all managed systems.

Provides the mechanism for agent communication.

Controls data access to and from the ePolicy Orchestrator database.

The ePolicy Orchestrator server should be hosted on a dedicated server. Typically, the ePolicy Orchestrator server is accessed via remote ePolicy Orchestrator consoles (installed on other systems), although it can be accessed from a local console as well.

For information on server sizing, see the ePolicy Orchestrator 3.6 Hardware Sizing and Bandwidth Usage White Paper.

Database serverePolicy Orchestrator uses a back-end database to store data, which is represented in the console tree of the user interface. The database contains information from each managed system.

The reporting and query features of ePolicy Orchestrator (accessed through the consoles) allow you to view this data in ways you can customize.

Figure 1-1 ePolicy Orchestrator on your network

7

Page 11: Walkthrough Guide

ePolicy Orchestrator® 3.6 Walkthrough Guide IntroductionComponents of ePolicy Orchestrator

1

ePolicy Orchestrator consolesYou can have multiple consoles installed on your network. One resides on the ePolicy Orchestrator server itself as a local console, and you can install as many as you like remotely throughout your network.

Typically, you will want one that is accessible to anyone in your environment who needs to access the ePolicy Orchestrator server. For example, you would want all administrators to be able to access the ePolicy Orchestrator server from a console to perform their management tasks. You can assign roles with different rights and permissions to users.

ePolicy Orchestrator agentThe agent is a vehicle of information and enforcement between the ePolicy Orchestrator and each managed system. For each of the managed systems, the agent:

Retrieves updates.

Executes scheduled tasks.

Enforces policies.

Forwards properties and events to the server.

Every system you want to manage must have this component installed.

Rogue System Detection (RSD) sensorSensors can reside on one or more systems per subnet. The active sensor notifies you when a rogue system (a system without an ePolicy Orchestrator agent) enters the environment, and can then initiate a user-defined automatic response on that system, such as deploying an agent to it.

Sensors “listen” to all broadcast layer 2 communications on the subnets. Although you can deploy multiple sensors to a subnet, only one is listening at a time. This allows a minimum of network activity, and ensures one sensor is always listening per subnet.

Master repositoryThe master repository exists on the ePolicy Orchestrator server and is the central location for all McAfee product updates. The master repository goes to the McAfee Download Site (source repository) at defined times to retrieve all available updates and signatures. The master repository contains a copy of the contents of the McAfee Download Site that can be accessed by the various update repositories in your organization.

Update repositoriesUpdate repositories are distributed throughout your environment, providing easy access for managed systems to pull DAT files, product updates, and product installations. Depending on how your network is configured, you may want to set up different types of repositories. You can create HTTP, FTP, and UNC share distributed repositories anywhere on your network, or you can create an update repository per subnet by converting an agent on each subnet into a SuperAgent repository.

8

Page 12: Walkthrough Guide

ePolicy Orchestrator® 3.6 Walkthrough Guide IntroductionPolicy, properties, and events

1

Policy, properties, and eventsTwo main purposes of ePolicy Orchestrator are to enforce policies on the managed systems, and to receive and process properties and events from all of the managed systems.

PoliciesA policy is a set of software configurations. The set of options differs depending on the product and system you are managing. For example, a policy for VirusScan Enterprise includes the configuration options for the On-Access Scanner and the On-Demand Scanner. You can set these configuration options differently for different systems.

Policies are the security product configurations that you want to ensure each site, group, or individual systems have. Policies are enforced during the policy enforcement interval. This interval is set to five minutes by default. Therefore, anytime an end user changes the settings on the system, the settings are returned to those set in the policy within five minutes.

New to version 3.6 is the ability to create named policies, that you can assign to independent locations of the Directory.

PropertiesProperties are collected from each system by the installed agent. These include:

System information (system name, memory available, etc.).

Information from installed ePolicy Orchestrator-managed security products (for example, VirusScan Enterprise).

EventsWhen a threat or compliance issue on a system is recognized by an installed and managed security product, an event file is created by the product that the agent delivers to the server to be processed. These events are processed and stored in the database.

Events are processed by event parser and applied to the notification rules or ePolicy Orchestrator Notifications. Notifications is a feature that allows you to configure rules to alert you to events in your network.

If the event triggers a notification rule, any of the following can happen depending on the rule’s configurations:

Notification messages are sent to specified recipients.

Actions, such as agent deployment, can be taken against the system.

Specified registered executables can be launched.

9

Page 13: Walkthrough Guide

ePolicy Orchestrator® 3.6 Walkthrough Guide IntroductionTasks, services, and accounts

1

Tasks, services, and accountsSeveral tasks and services of ePolicy Orchestrator require authentication with specific accounts to complete.

This information is useful if you encounter issues with the following tasks.

Task Service Account

Logging onto the server

McAfee ePolicy Orchestrator 3.6.0 Server (NAIMSRV.DLL)

ePolicy Orchestrator server account.

Deploying agents McAfee ePolicy Orchestrator 3.6.0 Server (NAIMSRV.DLL)

Local system account.

Upgrading agents McAfee ePolicy Orchestrator 3.6.0 Server (NAIMSRV.DLL)

Local system account on client system.

Replicating UNC share distributed repositories

McAfee ePolicy Orchestrator 3.6.0 Application Server (TOMCAT.EXE)

Local system account.

Replicating FTP distributed repositories

McAfee ePolicy Orchestrator 3.6.0 Application Server (TOMCAT.EXE)

Local system account.

Replicating HTTP distributed repositories

McAfee ePolicy Orchestrator 3.6.0 Application Server (TOMCAT.EXE)

Local system account.

Replicating SuperAgent repositories

McAfee Framework Service ePolicy Orchestrator server account. (Then the local system account installs them.)

Accessing ePolicy Orchestrator Notification

McAfee ePolicy Orchestrator 3.6.0 Application Server (TOMCAT.EXE)

Local system account.

Reporting (with an Authentication Type of ePO Authentication)

McAfee ePolicy Orchestrator 3.6.0 Server (NAIMSRV.DLL)

ePolicy Orchestrator server account. (This account is used to validate the user, then the NT or SQL account is used.)

Reporting (with an Authentication Type of SQL authentication)

McAfee ePolicy Orchestrator 3.6.0 Server (NAIMSRV.DLL)

SQL account.

Reporting (with an Authentication Type of NT Authentication)

McAfee ePolicy Orchestrator 3.6.0 Server (NAIMSRV.DLL)

NT account.

Reporting (with an Authentication Type of Currently logged on user)

McAfee ePolicy Orchestrator 3.6.0 Server (NAIMSRV.DLL)

Account of the currently logged in user. (This account is used to validate the user, then the NT or SQL account is used.)

Parsing events McAfee ePolicy Orchestrator 3.6.0 Event Parser (EVENTPARSER.EXE)

Local system account.

Note

If the local system account’s rights are diminished, installations on client systems of the agent or security products may fail on client systems.

10

Page 14: Walkthrough Guide

ePolicy Orchestrator® 3.6 Walkthrough Guide IntroductionMinimum requirements

1

Other times when credentials are neededWhile performing various tasks in ePolicy Orchestrator, you may be required to provide user credentials.

Minimum requirementsThe following are minimum hardware and software requirements for the ePolicy Orchestrator 3.6 server.

Table 1-1 Tasks and credentials

Task Credentials Location stored

Logging on to Active Directory containers (set in Active Directory Import wizard)

Active Directory administrator credentials (for each container that is mapped to the ePolicy Orchestrator Directory). These credentials are stored to run as a task.

If the Active Directory Discovery task is launched manually, it runs as the Microsoft Management Console.

If the task runs as scheduled, it runs as adi.exe using the stored credentials from an encrypted file.

Deploying agents from the ePolicy Orchestrator console by manually specifying the user name and password.

Credentials with administrator rights to the desired systems.

Stored in the encrypted CONSOLE.INI file.

Note

These are the minimum requirements. The number of systems you plan to manage as well as network considerations impact the hardware specifications your solution requires. For more information on hardware sizing, see the ePolicy Orchestrator 3.6 Hardware Sizing and Bandwidth Usage White Paper.

Table 1-2 Hardware and software minimum requirements

Hardware Software and Network

500MB free disk space (first-time installation); 1GB (upgrade); 2GB recommended.

Windows 2000 Advanced Server with SP 3 or later, Windows 2000 Server with SP 3 or later, Windows Server 2003 Enterprise, Windows Server 2003 Standard, or Windows Server 2003 Web operating systems.

512MB RAM Microsoft Internet Explorer version 6.0 or later.

Intel Pentium II-class processor or higher; 450MHZ or higher

Trust relationship with the primary domain controller (PDC).

1024x768, 256-color, VGA monitor User must have administrator rights on the server.

100MHZ or higher NIC Static IP address recommended

NTFS partition (recommended)

11

Page 15: Walkthrough Guide

2 Installing or Upgrading the Server

Whether you are installing ePolicy Orchestrator 3.6 as a new installation or upgrading from prior versions you must understand the minimum system requirements, preparation tasks on your network, and which pieces of information to take to the installation or upgrade.

Information on hardware sizing and bandwidth usage are located in the Hardware Sizing and Bandwidth Usage White Paper.

Installing for the first timeInstalling or upgrading the ePolicy Orchestrator server is straight forward, using a standard installation wizard. However, before running the installation wizard it is important that you perform certain tasks and have certain pieces of information at hand.

This section covers:

Pre-installation preparation.

Information to have during installation.

Note

Complete instructions on installing ePolicy Orchestrator are located in the ePolicy Orchestrator 3.6 Installation Guide.

12

Page 16: Walkthrough Guide

ePolicy Orchestrator® 3.6 Walkthrough Guide Installing or Upgrading the ServerInstalling for the first time

2

Pre-installation preparationBefore installing ePolicy Orchestrator 3.6, complete the following tasks:

Determine what database you are going to use. ePolicy Orchestrator includes the Microsoft SQL Database Engine (MSDE) 2000 (Service Pack 3) database which can be used for all of the reporting and data storage needs. This database has a storage limit of 2GB. This means that a standard installation and configuration of ePolicy Orchestrator 3.6 can record approximately 12 months of data for 10,000 client systems.

If the standard database does not meet your needs, utilize a Microsoft SQL Server 2000 database.

Update both the ePolicy Orchestrator server system and the ePolicy Orchestrator database server system with the latest Microsoft security updates.

Install and/or update the anti-virus software on the ePolicy Orchestrator server and database server systems and scan for viruses.

Install and/or update firewall software on the ePolicy Orchestrator server system. (For example, Desktop Firewall 8.5.)

Notify the network staff of the ports you intend to use for HTTP communications via ePolicy Orchestrator.

Information to have during installationHave the following information with you during installation, some of which may take some careful planning:

Server password.

Database server.

Ports you want to use.

E-mail address for Notifications.

Server passwordDuring the installation wizard, you are asked to provide a password for the Administrator account to access the ePolicy Orchestrator server. Use a password that is memorable and contains a combination of alpha- and numeric-characters.

Database serverDuring the installation wizard, you are asked to select the MSDE 2000 database, or use an already installed database server on the local system or remote (MSDE 2000, or SQL Server 2000).

Consider before installing:

Note

McAfee recommends that a dedicated server is used for the database if you are managing more than 2,000 client systems.

Note

Special characters (for example, %, <,>, and &) are not supported in passwords.

13

Page 17: Walkthrough Guide

ePolicy Orchestrator® 3.6 Walkthrough Guide Installing or Upgrading the ServerInstalling for the first time

2

If you are going to use a database other than the MSDE 2000 provided with ePolicy Orchestrator, you should install the database software before installing ePolicy Orchestrator.

If you are planning on managing more than 2,000 systems, use a dedicated server with Microsoft SQL Server 2000 with Service Pack 3 for the database.

Ports you want to useAs ePolicy Orchestrator runs, there is considerable communication between the server and the other components. During the installation wizard, you must designate the ports that the server uses for this communication. Although defaults are provided, we recommend that you consider strongly the ports that you will assign to the different types of communication.

Once ePolicy Orchestrator is installed, you cannot change some of these assignments through the ePolicy Orchestrator console without uninstalling the software.

Make sure that the ports you assign are not already assigned to other products.

Agent-to-Server communication port — This is the port the agent uses to communicate with the server. The default port is 80. This port cannot be changed after installation.

Console-to-Server communication port — This is the port the console uses to communicate with the server. The default port is 81. This port can be changed after installation.

Agent Wake-Up communication port — This is the port used to send agent wakeup calls. The default port is 8081. This port can be changed after installation.

Agent Broadcast communication port — This is the port used to send SuperAgent wakeup calls. The default port is 8082. This port can be changed after installation.

Event Parser-to-Server communication port — This is the port used by Rogue System Detection and ePolicy Orchestrator Notifications for non-SSL user interface communication and non-SSL sensor communication. The default port is 8080. This port cannot be changed after installation.

Console-to-Application Server communication port — This is the port used by Rogue System Detection and ePolicy Orchestrator Notifications for SSL user interface communication and SSL sensor communication. The default port is 8443. This port cannot be changed after installation.

Sensor-to-Server communication port — The port used by the Rogue System Detection sensor to report host-detected messages to the Rogue System Detection server using SSL. The default port is 8444. This port cannot be changed after installation.

Note

McAfee strongly recommends that you change this to another port due to potential conflicts in many environments. For example, to 82.

Note

McAfee strongly recommends that you change this to another port due to potential conflicts in some environments. For example, to 83. This port cannot be changed after installation.

14

Page 18: Walkthrough Guide

ePolicy Orchestrator® 3.6 Walkthrough Guide Installing or Upgrading the ServerUpgrading from a previous version

2

E-mail address for NotificationsIf you want to use the default rules of the ePolicy Orchestrator Notifications feature, you can provide an e-mail address on the Set E-mail Address panel of the installation wizard to which you want to receive notification messages when you enable any of the default rules.

This allows you to use the feature upon implementation, while you are still learning about it.

For complete information and procedures to install ePolicy Orchestrator 3.6, see the ePolicy Orchestrator 3.6 Installation Guide.

Upgrading from a previous versionYou can upgrade or migrate to ePolicy Orchestrator 3.6 if you are currently using:

ePolicy Orchestrator 3.0.2 or later.

Protection Pilot 1.0 or later.

Evaluation versions of ePolicy Orchestrator 3.6.

This section provides information on:

Preparation.

Information to have during the upgrade.

Upgrading issues.

PreparationBefore upgrading to ePolicy Orchestrator 3.6 complete the following tasks:

Upgrade the database software if it does not meet the minimum requirements.

Update both the ePolicy Orchestrator server system and the ePolicy Orchestrator database server system with the latest Microsoft security updates. (Specifically, be sure to install Service Pack 3 on all MSDE and SQL Server 2000 databases.)

Install and/or update the anti-virus software on the ePolicy Orchestrator server system and scan for viruses.

Install and/or update firewall software on the server system. (For example, Desktop Firewall 8.5.)

Notify the network staff of the ports you intend to use for HTTP communications via ePolicy Orchestrator.

Note

The e-mail address can be added or changed after installation.

Note

You cannot upgrade from beta versions of the software.

15

Page 19: Walkthrough Guide

ePolicy Orchestrator® 3.6 Walkthrough Guide Installing or Upgrading the ServerUpgrading from a previous version

2

Information to have during the upgradeHave the following information with you during the upgrade, some of which may take some careful planning:

Ports you want to use.

E-mail address for Notifications.

Ports you want to useAs ePolicy Orchestrator runs, there is considerable communication between the server and the other components. During the installation wizard, you must designate the ports that the server uses for this communication. Although defaults are provided, we recommend that you consider strongly the ports that you will assign to the different types of communication.

Once ePolicy Orchestrator is installed, you cannot change some of these assignments through the ePolicy Orchestrator console without uninstalling the software.

Make sure that the ports you assign are not already assigned to other products.

Agent-to-Server communication port — This is the port the agent uses to communicate with the server. The default port is 80. This port cannot be changed after installation.

Console-to-Server communication port — This is the port the console uses to communicate with the server. The default port is 81. This port can be changed after installation.

Agent Wake-Up communication port — This is the port used to send agent wakeup calls. The default port is 8081. This port can be changed after installation.

Agent Broadcast communication port — This is the port used to send SuperAgent wakeup calls. The default port is 8082. This port can be changed after installation.

Event Parser-to-Server communication port — This is the port used by Rogue System Detection and ePolicy Orchestrator Notifications for non-SSL user interface communication and non-SSL sensor communication. The default port is 8080. This port cannot be changed after installation.

Console-to-Application Server communication port — This is the port used by Rogue System Detection and ePolicy Orchestrator Notifications for SSL user interface communication and SSL sensor communication. The default port is 8443. This port cannot be changed after installation.

Sensor-to-Server communication port — The port used by the Rogue System sensor to report host-detected messages to the Rogue System Detection server using SSL. The default port is 8444. This port cannot be changed after installation.

Note

McAfee strongly recommends that you change this to another port due to potential conflicts in many environments. For example, to 82.

Note

McAfee strongly recommends that you change this to another port due to potential conflicts in some environments. For example, to 83. this port cannot be changed after installation.

16

Page 20: Walkthrough Guide

ePolicy Orchestrator® 3.6 Walkthrough Guide Installing or Upgrading the ServerUpgrading from a previous version

2

E-mail address for NotificationsTo use the default rules of the ePolicy Orchestrator Notifications feature, you can provide an e-mail address on the Set E-mail Address panel of the installation wizard to which you want to receive notification messages when you enable any of the default rules.

This allows you to use the feature upon implementation, while you are still learning about it.

For complete information and procedures to upgrade to ePolicy Orchestrator 3.6, see the ePolicy Orchestrator 3.6 Installation Guide.

Upgrading issuesIf your agents are not upgrading to version 3.5 agents, and you’re running VirusScan 7.0.0 on those systems, you may need to physically go to these systems and perform the following steps:

1 Stop any of the following processes that are running: NAPRDMGR.EXE, FRMWORKSERVICE.EXE, or UPDATERUI.EXE.

2 Force uninstall the agent by running FRMINST.EXE /FORCEUNINSTALL from the command line. (FRMINST.EXE is located in the Common Framework installation directory.)

3 Go back to the ePolicy Orchestrator server and deploy an agent to the system.

Note

The e-mail address can be added or changed after installation.

17

Page 21: Walkthrough Guide

3 Organizing the Directory and Repositories

The ePolicy Orchestrator software requires you to configure and set up several components. Although extensive, the configurations allow you to customize the product specifically for your environment. Carefully planning the implementation of your ePolicy Orchestrator solution is essential before installing the software.

You should consider how your:

Directory should be organized.

The client systems should receive their updates.

This chapter contains the following sections:

ePolicy Orchestrator Directory: concepts and roles.

Repositories.

ePolicy Orchestrator Directory: concepts and rolesThe Directory allows you to combine systems into sites and groups. Combining systems with similar properties or requirements allows you to manage policies for these groupings in one place, rather than having to set policies for individual systems. It can also make visually browsing your Directory much easier.

Before discussing Directory organization further, it is important to define some terms:

Directory The Directory contains all your managed network systems that you are managing with ePolicy Orchestrator. It is possible to add all the systems to be managed by ePolicy Orchestrator into one site in the Directory. However, this flat unorganized list makes setting specific policies for different systems very difficult. Therefore, organizing the systems in smaller units within the Directory is essential.

Sites A site is a first-level group immediately under the Directory root of the console tree. Systems contained within a site can be organized into groups. Sites can contain groups and individual systems.

Groups A group is a secondary grouping beneath a site. It can contain more groups (sub-groups) and individual systems, but a group cannot contain a site.

18

Page 22: Walkthrough Guide

ePolicy Orchestrator® 3.6 Walkthrough Guide Organizing the Directory and RepositoriesePolicy Orchestrator Directory: concepts and roles

3

Lost&Found groups Lost&Found groups store system names whose locations could not be determined by the ePolicy Orchestrator server. The administrator (with appropriate rights) must move the systems in Lost&Found groups to the appropriate place in the Directory to manage them. Each site has a Lost&Found group, and the Directory has a global Lost&Found group.

InheritanceInheritance is an important property that makes policy administration simpler. Because of inheritance, child nodes in the Directory hierarchy inherit policies that have been set at their parent nodes. For example:

Policies set at the Directory level are inherited by sites.

Site policies are inherited by groups and individual systems within that site.

Group policies are inherited by sub-groups or individual systems within that group.

Inheritance is enabled by default for all sites, groups and individual systems that you add to your Directory. This allows you to set policies and schedule scan tasks in fewer places.

However, inheritance can be turned off at any location of the Directory to allow for customization.

About ePolicy Orchestrator rolesIf you plan to have multiple people administer ePolicy Orchestrator in your environment, you can create multiple user accounts in the console. Fellow administrators can use these accounts to log onto the server.

The different types of user accounts include:

Global administrator.

Site administrators on page 20.

Global reviewers on page 21.

Site reviewers on page 21.

Global administrator Global administrators have read and write permissions and rights to all operations. When you install the server and console, a global administrator account with the user name admin is created.

You can create additional global administrator accounts for other people who need global administrative rights to all aspects of the console.

Note

Let inheritance do the work for you. While you can assign security policies and schedule client on-demand scans or DAT file update tasks at any node of the Directory, consider setting policies at the highest-level node possible. If you do, you’ll have fewer changes to make. Avoid setting policies at the individual system level if possible.

19

Page 23: Walkthrough Guide

ePolicy Orchestrator® 3.6 Walkthrough Guide Organizing the Directory and RepositoriesePolicy Orchestrator Directory: concepts and roles

3

Global administrators can use the console to deploy agents and security products, change agent or product policies, create and run client tasks for updating DAT files or performing on-demand scans for any node in any site in the Directory. In addition, only global administrators can perform certain server-based functions.

Only global administrators can perform the following repository management functions:

Define, edit, or remove source and fallback repositories.

Create, change, or delete global distributed repositories.

Export or import the repository list from the server.

Schedule or perform pull tasks to update the Master Repository

Schedule or perform replication tasks to update distributed repositories

Check packages into the master repository, move packages between branches, or delete packages from the master repository.

Only global administrators can perform the following server management functions:

Change server settings and work with server events.

Schedule Synchronize Domains server tasks.

Verify the integrity of IP management settings, or change site-level IP subnet masks.

Add and delete user accounts.

View and change all options on all tabs in the Events dialog box, if using ePolicy Orchestrator authentication.

Import events into ePolicy Orchestrator databases and limit events that are stored there.

Create, rename, or delete sites.

Site administratorsSite administrators have read, write, and delete permissions and rights to all operations (except those restricted to global administrator user accounts) for one or more products, and one or more sites in the Directory.

Site administrators can use the console to deploy agents and security products, change agent or product policies, create and run client tasks for all groups or systems within their sites in the Directory (for products to which they have permissions). Site administrators can also run reports, but the reports show only data on systems located within their sites. The site administrator is able to see, but not change, other sites in the Directory.

Best practices informationCreate site administrator accounts if you have a very decentralized network with no single global administrator account or where different local administrators have local control over their parts of the network. For example, your organization may have sites located in different cities or countries, and these sites may have local IT or network administrators with rights to install and manage software on systems in that part of the network.

You can also create site administrator accounts if you have administrators who you want to only have ePolicy Orchestrator permissions to specific products.

20

Page 24: Walkthrough Guide

ePolicy Orchestrator® 3.6 Walkthrough Guide Organizing the Directory and RepositoriesePolicy Orchestrator Directory: concepts and roles

3

Global reviewersGlobal reviewers can view, but not edit, all settings in the console (except for Rogue System Detection), including property settings, policy, and task settings for all nodes in the Directory. Global reviewers can also run enterprise-wide and site-specific reports.

Site reviewersSite reviewers can only view settings and run reports for specified products within specified sites of the Directory.

Organizing the DirectoryThe Directory is a hierarchical tree structure that allows you to group your systems within units called sites and groups. Grouping systems with similar properties or requirements into these units allows you to manage policies for collections of systems in one place, rather than having to set policies for each system separately.

As part of the planning process, consider the best way to divide systems into sites and groups prior to building the Directory.

SitesA site is a primary-level unit immediately under the Directory root in the console tree. Traits of sites include:

Sites can only be created by global administrators.

A site can include both groups and systems.

Sites (and their groups and systems) are administered by a global administrator or by a site administrator who has ownership of the specific site. (Site administrators have administrative rights only over the sites to which ownership has been assigned.)

Each site contains a Lost&Found group; a temporary container for systems for which ePolicy Orchestrator wasn’t able to automatically place in the correct location within the site.

GroupsA group is a secondary-level (or subsequent level) unit of the Directory. Traits of groups include:

Groups can be created by global administrators, or the site administrator of the site to which the group belongs.

A group can include both groups and systems.

Groups are administered by a global administrator or by the site administrator of the site to which the group belongs.

Groups do not contain a Lost&Found group.

21

Page 25: Walkthrough Guide

ePolicy Orchestrator® 3.6 Walkthrough Guide Organizing the Directory and RepositoriesePolicy Orchestrator Directory: concepts and roles

3

Lost&Found groupsThe Directory root and each site includes a Lost&Found group. Depending on the methods you use to create and maintain Directory segments, the server uses different characteristics to determine where to place systems within the Directory. Lost&Found groups store systems whose locations could not be determined by the server.

Best practices informationIf you delete systems from the Directory, you also need to uninstall the agent from these systems. Otherwise, these systems continue to appear in the Lost&Found group because the agent continues to communicate to the server.

Environmental bordersHow you implement ePolicy Orchestrator and organize the systems for management depends significantly on the borders that exist in your network. Borders influence the organization of the Directory differently than the organization of your network topology.

McAfee recommends evaluating the following borders in your network and organization, and whether they must be taken into consideration when defining the organization of your Directory.

TopologicalYour network is already defined by domains or Active Directory containers. The better organized your network environment, the easier it is to create and use the Directory.

GeographicalIf your organization includes facilities in multiple geographic locations, even on multiple continents, this must be taken into consideration when building your Directory. Available bandwidth and administrative roles must be considered when your organization has multiple locations.

Managing security is a constant balance between protection and performance. Organize your Directory to make the best use of limited network bandwidth. Consider how the server connects to all the parts of your network, especially remote locations that are often connected by slower WAN or VPN connections, instead of faster LAN connections. You may want to set updating and agent-to-server communication policies differently for these remote sites to minimize network traffic over slower WAN or VPN connections.

Grouping systems first by geography provides several advantages for setting policies:

You can set update policies for the site or group so that all systems update from one or more distributed software repositories located nearby.

If sites are located in other countries, you can deploy language-specific versions of the agent or security software to these systems at once.

You can configure the update and product deployment policies for these systems once.

You can schedule tasks to run at off-peak hours.

22

Page 26: Walkthrough Guide

ePolicy Orchestrator® 3.6 Walkthrough Guide Organizing the Directory and RepositoriesePolicy Orchestrator Directory: concepts and roles

3

Political Many large networks are divided because different individuals or groups are responsible for managing various portions of the network. Sometimes these borders do not coincide with the topological or geographical borders. Who you want to access and manage the various segments of the Directory can affect how you structure it.

FunctionalSome networks are divided by the roles of the groups and individuals using the network; for example, Sales and Engineering. Even if the network is not divided by functional borders, you may need to organize the Directory by functionality if different groups of users require different policies.

Different business groups may run different kinds of software that require special anti-virus or security policies. For example, you may want to arrange your e-mail exchange servers or SQL database servers into a group and set specific exclusions for VirusScan Enterprise on-access scanning.

When planning, focus on the access individuals require or have to the ePolicy Orchestrator server or nodes, and the borders you must accommodate.

IP address filters and sortingIn many networks, subnets and IP address information reflect organizational distinctions, such as geographical location or job function. If these organizational units reflect your needs to organize systems for policy management, consider using them to create your Directory structure by setting IP address filters for sites and groups. ePolicy Orchestrator provides tools, such as an IP sorting task that can automatically place systems in the correct site or group according to IP address. This can be a very powerful tool for automatically populating your Directory and making sure systems stay in the intended locations.

If you use IP filters, you must set the IP filtering properties at each level of the Directory properly. Know that:

To set an IP filter for a group, you must also set IP filters in parent groups or sites.

The IP ranges specified in lower-level groups must be a subset of the IP range of the parent.

IP filters cannot overlap between different groups. Each IP range or subnet mask in a given site or group must cover a unique set of IP addresses that cannot be contained in other filter settings in other sites or groups.

After creating groups and setting your IP filters, run an IP integrity check task to make sure your IP filter hierarchy is valid. This task alerts you if there are any conflicts or overlaps between IP filters for different sites or groups.

You can assign IP ranges or IP subnet mask values to sites and groups as you create them, or add or edit them at any time later.

IP filtering for the first timeWhen the agent calls into the server for the first time, the system is placed in the Directory location to which it has been assigned. The server searches for the appropriate site whose IP mask or range matches the agent’s IP address.

23

Page 27: Walkthrough Guide

ePolicy Orchestrator® 3.6 Walkthrough Guide Organizing the Directory and RepositoriesePolicy Orchestrator Directory: concepts and roles

3

Automatically populating the Directory with this method is the result of an algorithm that uses both IP filters you create and domain information for the NT domain to which the new system belongs.

The server uses the following search algorithm to place systems in the Directory based on the criteria in this order:

1 Site IP filter — If a site with a matching IP filter is found, the system is placed in that site based on the criteria in this order:

a In a group named the same as the NT domain to which the system belongs.

b In a group with a matching IP filter.

2 Site Domain name — If no site is found with a matching IP filter, the server searches for a site with the same name as the NT domain to which the system belongs. If such a site is found, the server searches for a group with a matching IP filter and places the system within. If no group is found, the system is placed in the Lost&Found group of the site.

3 No site IP filter or domain name match is found — If the server cannot find an IP or domain name match in any site, the server adds the system to the global Lost&Found.

Best practices informationThis feature is useful when not using ePolicy Orchestrator to deploy agents to systems on your network. If you use another distribution method, the agent is installed on the system before the system is added to the Directory. After the agent installs and calls into the server for the first time, ePolicy Orchestrator adds it to the Directory. If you set IP filters for the sites and groups, the system is added to the appropriate location. Otherwise, it is added to the Lost&Found group and you must move it manually to the appropriate group. Especially in a large network, using IP filters to get the system in the right location can save time.

Tip

Be careful if you have sites or groups in your Directory with the same name as NT domains. The domain name search rule takes precedence over the IP group rule.

If you want the system to populate the appropriate location, create the IP group under the site or group associated with the domain, or do not create the domain group under the site.

Note

If no group match for IP address or domain name is found, the system is placed in the Lost&Found group of the site.

Note

Automatic IP address sorting does not apply to systems that you add to the Directory using Active Directory integration.

24

Page 28: Walkthrough Guide

ePolicy Orchestrator® 3.6 Walkthrough Guide Organizing the Directory and RepositoriesRepositories

3

RepositoriesBefore implementing the ePolicy Orchestrator software, you should decide the type of update repositories to use, and how they should be organized.

Source repositoryThe source repository provides all updates for your master repository. The default source repository for clean installations is the McAfee FTP update site (FtpSite), but you can change the source repository or even configure multiple source repositories if you require. McAfee recommends using the McAfee HTTP (HttpSite) or FTP (FTPSite) update sites as your source repository.

McAfee posts software updates to these sites regularly. For example, DAT files are posted daily. Update your master repository with updates as they are available.

Use pull tasks to copy source repository contents to the master repository.

The McAfee update sites provide virus definition (DAT) and scanning engine file updates (SCP templates and Spam rules are also available if the corresponding managed products are in the master repository as well). All other packages and updates must be checked into the master repository manually.

Fallback repositoryThe fallback repository is a repository from which managed systems can retrieve updates when their usual repositories are not accessible. For example, when network outages or virus outbreaks occur, accessing your established update infrastructure may be difficult. Therefore, managed systems can remain up-to-date in such situations. The default fallback repository is the McAfee HTTP download site (HTTPSite) for clean installations, upgrades keep the designated repository. You can only define one fallback repository.

Source repositories can be used as a fallback repository, but fallback repositories cannot be created manually.

Master repositoryThe master software repository maintains the latest versions of security software and updates for your environment. This repository is the source of software and updates for the rest of your environment. There is only one master repository for each ePolicy Orchestrator server.

The master repository is configured when installed. However, you must ensure that proxy server settings are configured correctly. By default, ePolicy Orchestrator uses Microsoft Internet Explorer proxy settings.

Note

You can download updates manually and check them into your master repository. However, using a source repository automates this process.

25

Page 29: Walkthrough Guide

ePolicy Orchestrator® 3.6 Walkthrough Guide Organizing the Directory and RepositoriesRepositories

3

Distributed repositoryDistributed repositories host copies of your master repository contents (although you can restrict which files get copied from the master repository to each of the distributed repository). Consider using distributed repositories and placing them throughout your network strategically to ensure managed systems are updated while network traffic is minimized, especially across slow connections.

As you update your master repository, ePolicy Orchestrator replicates the contents to the distributed repositories, instead of to each system.

A large organization can have multiple locations with limited bandwidth connections between them. Distributed repositories limit updating traffic across low-bandwidth connections. If you create a distributed repository in the remote location and configure the systems within the remote location to update from this distributed repository, the updates are copied across the slow connection only once — to the distributed repository — instead of once to each system in the remote location.

Systems to use for distributed repositoriesUse an existing server to host the distributed repository. Although you do not need to use a dedicated server, the server should be large enough for the desired systems to connect for updates. Servers are better than workstations because they are more likely to be running all the time.

Types of distributed repositoriesePolicy Orchestrator supports four different types of distributed repositories. Consider your environment and needs when determining which type of distributed repository to use. You are not limited to using one type, and may have the need to use several, depending on the nature of your network.

SuperAgent repositoriesUse systems hosting SuperAgents as distributed repositories. If global updating is enabled, SuperAgent repositories update managed systems automatically as soon as selected updates and packages are checked into the master repository. You do not need to spend additional time creating and configuring repositories or the update tasks.

SuperAgent repositories have several advantages over other types of distributed repositories:

Folder locations are created automatically on the host system before adding the repository to the repository list.

File sharing is enabled automatically on the SuperAgent repository folder.

SuperAgent repositories don’t require replication or updating credentials.

Note

McAfee recommends using SuperAgent repositories and global updating together to ensure your managed environment is up-to-date.

Note

Although SuperAgent broadcast wakeup call functionality requires a SuperAgent in each broadcast segment which contains managed systems, this is not a requirement for SuperAgent repository functionality. Managed systems only need to “see” the system hosting the repository.

26

Page 30: Walkthrough Guide

ePolicy Orchestrator® 3.6 Walkthrough Guide Organizing the Directory and RepositoriesRepositories

3

SuperAgents and global updating use a proprietary protocol, SPIPE.

FTP repositoriesIf you are unable to use SuperAgent repositories, you can use an existing FTP server to host a distributed repository. Use your existing FTP server software such as Microsoft Internet Information Services (IIS) to create a new folder and site location for the distributed repository. See your web server documentation for details to create a site.

HTTP repositoriesIf you are unable to use SuperAgent repositories, you can use an existing HTTP server to host a distributed repository. Use your existing HTTP server software such as Microsoft Internet Information Services (IIS) to create a new folder and site location for the distributed repository. See your web server documentation for details to create a site.

UNC share repositoriesIf you are unable to utilize SuperAgent repositories, create a UNC shared folder to host a distributed repository on an existing server. Be sure to enable sharing across the network for the folder so that the ePolicy Orchestrator server can copy files to it.

Unmanaged repositoriesIf you are unable to use managed distributed repositories, ePolicy Orchestrator administrators can create and maintain distributed repositories that are not managed by ePolicy Orchestrator.

If a distributed repository is not managed, a local administrator must keep the repository up-to-date manually.

Once the distributed repository is created, you can use ePolicy Orchestrator to configure managed systems of a specific Directory site or group to update from it.

Tip

McAfee recommends that you manage all distributed repositories through ePolicy Orchestrator. Managing distributed repositories with ePolicy Orchestrator and using global updating, or scheduled replication tasks frequently ensures your managed environment is up-to-date. Only use non-managed distributed repositories if your network or organizational policy do not allow managed repositories.

27

Page 31: Walkthrough Guide

4 Deploying the Agent and Products

Once the ePolicy Orchestrator server and consoles are installed, you must deploy certain core components and security products in order to manage your systems.

ePolicy Orchestrator agentThe agent is the distributed component of ePolicy Orchestrator that must be installed on each system in your network that you want to manage. SuperAgents are agents that have been enabled to distribute broadcast wakeup calls. SuperAgents can also be used as repositories from which to distribute products and product updates.

The agent collects and sends information among the server, update repositories, managed systems, and products. Systems cannot be managed without an installed agent.

Due to the variety of network environments, McAfee provides several methods for you to get the agent on to the systems you want to manage.

About the ePolicy Orchestrator agentConsider the following topics when planning to distribute agents:

Agent installation folder on page 28.

Agent language packages on page 29.

The agent installation package on page 29.

Agent-server communication on page 31.

SuperAgents and broadcast wakeup calls on page 32.

Agent installation folderThe location of the agent installation folder depends on whether the agent is located on managed systems or the server.

On the server, the agent is installed in this location:

<system_drive>\program files\common files\mcafee\common framework

On the client system, if the agent was installed as part of another product installation or deployed from the console to the system, it is installed by default in this location:

28

Page 32: Walkthrough Guide

ePolicy Orchestrator® 3.6 Walkthrough Guide Deploying the Agent and ProductsePolicy Orchestrator agent

4

<system_drive>\program files\mcafee\common framework

On the client system, if you are upgrading the agent from version 2.5.1, the new agent is also installed after the existing agent is uninstalled, by default in this location:

<system_drive>\program files\network associates\common framework

Agent language packagesAgent installation packages, both default and custom, install in English. To use other language versions of the agent on the systems you want to manage, you must check the desired agent language packages into the master repository.

Each agent language package includes only those files needed to display the user interface for that language. Agent language packages can be replicated to distributed repositories.

After the initial ASCI, the agent retrieves the new package that corresponds to the in-use locale and applies it. In this way, the agent retrieves only language packages for the locales being used on each managed system.

Multiple language packages can be stored on managed systems at the same time to allow users to switch between available languages by changing the locale. If a locale is selected for which a language package is not available locally, the agent software appears in English.

Agent language packages are available for these languages:

The agent installation packageThe FRAMEPKG.EXE file is created when you install the server. It is a customized installation package for agents that report to your server. The agent installation package contains the server name, its IP address, ASCI port number, and other information that allows the agent to communicate with the server.

Caution

Once the agent has been installed, you cannot change its installation directory without first uninstalling it.

Note

The agent software continues to appear in the current language until the new language package has been applied.

Brazilian Portuguese Italian

Chinese (Simplified) Japanese

Chinese (Traditional) Korean

Dutch Polish

English Spanish (Traditional Sort)

French (Standard) Swedish

German (Standard)

29

Page 33: Walkthrough Guide

ePolicy Orchestrator® 3.6 Walkthrough Guide Deploying the Agent and ProductsePolicy Orchestrator agent

4

By default, the agent installation package is installed in this location:

C:\PROGRAM FILES\MCAFEE\EPO\3.6.0\DB\SOFTWARE\CURRENT\ePOAGENT3000\INSTALL\0409\FRAMEPKG.EXE

This is the installation package that the ePolicy Orchestrator server uses to deploy agents.

The default agent installation package contains no embedded user credentials. When executed on the system, the installation uses the account of the currently logged-on user.

Custom agent installation packagesIf you use a distribution method other than ePolicy Orchestrator software’s own deployment capabilities (such as login scripts or third-party deployment software), you must create a custom agent installation package (FRAMEPKG.EXE) with embedded administrator credentials if users do not have local administrator permissions. The user account credentials you embed are used to install the agent.

To create a custom agent installation package:

1 In the console tree, select the server.

2 In the details pane, select the General tab, then click Agent Installation Package Creation Wizard.

3 Click Next. The User Credentials dialog box appears.

4 Type the User Name (<DOMAIN>\<USER>) and Password you want to embed in the package, then click Next.

5 On the Install Directory dialog box, click Browse and select the location to which you want to save the custom agent installation package.

Note

Microsoft Windows XP Service Pack 2 and later operating systems do not allow embedded administrator credentials until the package file name has been added to the exception list of the Windows firewall.

Figure 4-1 Agent Installation Package Creation wizard — User Credentials

30

Page 34: Walkthrough Guide

ePolicy Orchestrator® 3.6 Walkthrough Guide Deploying the Agent and ProductsePolicy Orchestrator agent

4

6 Click Next. The Create Package dialog box appears, showing the progress of the creation.

7 Click Next, then Finish.

You can distribute the custom installation package file as needed.

If you plan to deploy the custom installation package with ePolicy Orchestrator, check the package into your master repository.

Agent-server communication During agent-server communication, the agent and server exchange information using SPIPE, a proprietary network protocol used by ePolicy Orchestrator for secure network transmissions. At each communication, the agent collects its current system properties and events, then sends them to the server. The server sends any new or changed policies, tasks, and repository list to the agent. The agent then enforces the new policies locally on the managed system.

Agent and server communication can be initiated in three ways:

Agent-to-server-communication interval.

Agent-server communication after agent startup on page 32.

Wakeup calls on page 32.

Agent-to-server-communication intervalThe agent-to-server-communication interval (ASCI) is set on the General tab of the ePO Agent 3.5.0 policy pages. This setting determines how often the agent calls into the server for data exchange and updated instructions. By default, the ASCI is set to 60 minutes. With this setting, the agent checks into the server once every hour. This is a configurable setting on the agent policy pages.

Best practices informationWhen considering whether to leave this policy setting at the default, or to modify it, you must consider your organization’s threat response requirements, available bandwidth, and the hardware hosting the server. Be aware that ASCI communication can generate significant network traffic, especially in a large network. In such a case, you probably have agents in remote sites connecting to the server over slower network connections. For these agents, you may want to set a less frequent ASCI. The following table lists general ASCI recommendations for several common network connection speeds.

Table 4-1 General recommended ASCI settings

Network Size Recommended ASCI

Gigabit LAN 60 minutes

100MB LAN 60 minutes

WAN 360 minutes

* Dial-up or RAS 360 minutes

10MB LAN 180 minutes

Wireless LAN 150 minutes

* When you connect to a corporate intranet via dial-up or RAS, the agent communicates to the ePolicy Orchestrator server when the connection is detected.

31

Page 35: Walkthrough Guide

ePolicy Orchestrator® 3.6 Walkthrough Guide Deploying the Agent and ProductsePolicy Orchestrator agent

4

Agent-server communication after agent startup After the installation, or if the agent service is stopped and restarted, the agent calls into the server at a randomized interval within ten minutes. The second and subsequent ASCI after startup occurs with the ASCI set in the agent policy (60 minutes by default).

You can force the agent to communicate to the server immediately after the installation by running the CMDAGENT.EXE with the /P command-line option.

Wakeup callsWhen you send a wakeup call from the server to agents in your environment, the agents are prompted to call into the server. Wakeup calls can be sent manually or scheduled as a task and are useful when you have made policy changes or checked in updates to the master repository that you want to be applied to the managed systems sooner than when the ASCI may occur.

SuperAgents and broadcast wakeup callsIf you plan to use agent wakeup calls in your network to initiate agent-server communication, consider converting an agent on each network broadcast segment into a SuperAgent. SuperAgents distribute the agent wakeup call’s bandwidth impact, minimizing network traffic. Depending on your network environment, you may find SuperAgent wakeup calls to be a more resource-efficient method of prompting agents to call in, than relying on the server to send wakeup calls to all agents.

Note

For complete information on balancing bandwidth, server hardware, and ASCI, see the ePolicy Orchestrator 3.6 Hardware Sizing and Bandwidth Usage white paper.

32

Page 36: Walkthrough Guide

ePolicy Orchestrator® 3.6 Walkthrough Guide Deploying the Agent and ProductsePolicy Orchestrator agent

4

Instead of sending agent wakeup calls from the server to every agent, the server sends the SuperAgent wakeup call to SuperAgents in the selected Directory segment. When SuperAgents receive this wakeup call, they send broadcast wakeup calls to all the agents in their network broadcast segments. This reduces network traffic, which is beneficial in large networks where ePolicy Orchestrator may manage agents in remote sites over lower-speed WAN or VPN connections.

Best practices informationTo deploy the right number of SuperAgents to the right locations, first analyze the divisions of broadcast segments in your environment and select a system (preferably a server) to host the SuperAgent. Any agents that do not have a SuperAgent in the local broadcast segment do not receive the broadcast wakeup call.Similar to the regular agent wakeup call, the SuperAgent wakeup call utilizes the SPIPE protocol.

Ensure that the agent wakeup port (8081 by default) is not blocked by your firewall.

Figure 4-2 Broadcast wakeup calls

Server sends a wakeup call to all SuperAgents.

SuperAgents send a broadcast wakeup call to all agents in the same broadcast segment.

All agents (regular agents and SuperAgents) exchange data with the server.

Any agents without an operating SuperAgent on its subnet are not be prompted to communicate with the server.

Agent

4

SuperAgent

1

2

Server

— Broadcast Segment—

3

Agent Agent Agent

1

2

3

4

1

2

3

4

33

Page 37: Walkthrough Guide

ePolicy Orchestrator® 3.6 Walkthrough Guide Deploying the Agent and ProductsDistributing agents

4

Agent activity logsThe agent log files are useful when determining agent status or troubleshooting problems. There are two log files that record agent activity, both are located in the agent installation folders on the managed system running Windows 95, Windows 98, or Windows NT systems. On managed systems running Windows 2000, Windows 2003, and Windows XP, these files are located in the Common Framework folder (within Documents and Settings):

Agent activity log

The agent activity log is an XML file named AGENT_<SYSTEM>.XML where <SYSTEM> is the NetBIOS name of the system on which the agent is installed. This log file records agent activity related to such things as policy enforcement, agent-to-server communication, and event forwarding. You can define a size limit of this log file.

You can configure the level of logging of agent activity on the Logging tab of the ePO Agent 3.5.0 | Configuration policy pages.

Detailed agent activity log

The detailed agent activity log (AGENT_<SYSTEM>.LOG) file contains troubleshooting message in addition to the content of the agent activity log. This file has a 1MB size limit. When this log file reaches 1MB, a backup copy is made (AGENT_<COMPUTER>_BACKUP.LOG).

Distributing agentsDue to the variety of scenarios and requirements of different environments, there are several methods you can use to distribute the agent to the systems you want to manage. Before using any of these methods, you should consider each.

The following table details the advantages and disadvantages of the different methods to distribute the agent.

Table 4-2 Advantages and disadvantages of agent distribution methods

Method Advantages Disadvantages

Deploying agents while creating Directory

By deploying the agent automatically while creating the sites and groups of the Directory, you don’t have to complete any additional steps.

If you are creating sites by importing large NT domains or Active Directory containers, too much network traffic may be generated for your network resources.

Deploying agents from ePolicy Orchestrator

This is an efficient method for distributing the agent.

You must embed user credentials with administrator rights to the desired systems. Also, you must ensure that systems running Microsoft XP Service Pack 2, have File and Printer sharing added to the firewall exceptions list.

Using login scripts This is an efficient method for an environment where systems log onto the network frequently. You do the work once, and the agent is deployed automatically.

Systems that don’t log onto the network frequently, may not be running the most up-to-date agent.

34

Page 38: Walkthrough Guide

ePolicy Orchestrator® 3.6 Walkthrough Guide Deploying the Agent and ProductsDistributing agents

4

Deploying the agent from ePolicy Orchestrator

Installing the agent with login scripts

Installing the agent manually

Enabling the agent on unmanaged McAfee products

Including the agent on an image

Distributing the agent using other deployment products

Distributing the agent to WebShield appliances and Novell NetWare servers

Deploying the agent from ePolicy OrchestratorYou can use ePolicy Orchestrator to deploy agents to your systems. This method uses Windows NT push technology.

When to use this methodThis is a desirable method to install agents if you already have large sections of your Directory populated. This is an efficient method if you were able to build Directory segments by importing domains or Active Directory containers.

RequirementsTo use this method, several requirements must be met, including:

Systems to which you want to deploy the agent must already be added to the Directory.

Installing manually This is an efficient method if you are not using ePolicy Orchestrator to deploy the agent, or if you have many Windows 95 and Windows 98 systems and do not want to enable file and print sharing on them.

This is not a time-efficient method if you have many systems.

Including the agent on an image

Installing the agent as part of an image prevents the bandwidth impact that other forms of distribution can incur. This method also reduces the overhead by integrating the task into another one that must occur.

If you do not use images consistently, this method would not be efficient to ensure coverage.

Enabling the agent on unmanaged McAfee products

Enabling an agent that is already on the client system rather than deploying the 1.5MB package, can save significant bandwidth and time.

The disabled agent may be out-of-date and require you run the deployment task to upgrade the agent to the current release.

You cannot change the agent installation folder without uninstalling and reinstalling the agent — agents that you enable may be located in a different folder than agents that you deploy in your network by some other method.

Table 4-2 Advantages and disadvantages of agent distribution methods

Method Advantages Disadvantages

35

Page 39: Walkthrough Guide

ePolicy Orchestrator® 3.6 Walkthrough Guide Deploying the Agent and ProductsDistributing agents

4

For information and instruction, see Chapter 3, Creating a Directory of Managed Systems in the product guide.

Specify domain administrator credentials.

Domain administrator rights are required to access the default Admin$ shared folder on the desired systems. The ePolicy Orchestrator server service requires access to this shared folder in order to install agents and other software.

Verify the ePolicy Orchestrator server can communicate with the desired systems.

Before beginning a large agent deployment, use ping commands to verify that the server can communicate with a few systems in each segment of your network to which you want to deploy agents.

If the targeted systems respond to the ping, then ePolicy Orchestrator can communicate with them.

Verify that the Admin$ share folders on the desired systems are accessible from the server.

This test also confirms your administrator credentials, because you cannot access remote Admin$ shares without administrator rights.

To access Admin$ shares on desired systems from the ePolicy Orchestrator server:

a Select Start | Run.

b Type the path to the client Admin$ share by specifying either the system name or IP address.

If the systems are properly connected over the network, your credentials have sufficient rights, and the Admin$ shared folder is present, you should see a Windows Explorer dialog box.

Ensure file and print sharing is enabled. (This is disabled by default on Windows 95, Windows 98, and Windows ME systems.)

In addition, if you have systems in your network running these operating systems, you must make sure they can be managed by ePolicy Orchestrator. By default, these systems do not allow ePolicy Orchestrator administration. To enable these systems for ePolicy Orchestrator administration, download VCREDIST.EXE and DCOM 1.3 updates from the Microsoft web site and install them on each client as required.

Ensure network access is enabled on Windows XP Home systems.

Note

If you have not yet created the Directory, you can send the agent installation package to systems at the same time that you are adding sites, groups, and systems to the Directory.

However, McAfee does not recommend this procedure if you are creating your Directory by importing large NT domains or Active Directory containers. This can generate too much network traffic.

Note

The ability to successfully use ping commands from the ePolicy Orchestrator to the managed systems is not required for the agent to communicate with the server after the agent is installed. This is only a useful test for determining if you can deploy agents from the server to them.

36

Page 40: Walkthrough Guide

ePolicy Orchestrator® 3.6 Walkthrough Guide Deploying the Agent and ProductsDistributing agents

4

To deploy the agent from the ePolicy Orchestrator console or install a custom agent installation package on systems running Windows XP Home, you must enable network access.

To enable network access on systems running Windows XP Home:

a Select Start | Control Panel.

b Click Performance and Maintenance.

c Click Administrative Tools.

d Select Local Security Policy. The Local Security Settings application window appears.

e In the console tree under Security Settings | Local Policies, select Security Options. The available policies appear in the details pane.

f Select Network access: Sharing and security model for local accounts to open the Network access dialog box.

g Select Classic - local user authenticate as themselves, then click OK. Local users are able to authenticate and access resources on the system from the network.

Installing the agent with login scriptsUsing network login scripts is a very reliable and popular way to make sure that every system logging onto your network is running an agent. You can create a login script to call a batch file that checks if the agent is installed on systems attempting to log onto the network. If no agent is present, the batch file can install the agent before allowing the system to log on. Within ten minutes of being installed, the agent calls into the server for updated policies, and the system is added to the Directory.

When to use this methodThis is a desirable method to use when:

You assigned IP sorting filters or NT domain names when creating the segments of your Directory.

You already have a managed environment and you want to ensure that new systems logging onto the network become managed as a result.

You already have a managed environment and you want to ensure systems are running a current version of the agent.

Best practices informationMcAfee recommends that you first create segments of your Directory that use either network domain names or IP address filters that add the expected systems to the desired sites and groups when the agents call into the server for the first time automatically. If you don’t, all systems are added to the Lost&Found group and you must move them later manually.

Especially when distributing agents to systems in a very large network, creating a Directory that uses some automated sorting method before installing agents with login script can save valuable time.

The details of the login script used to install the agent can vary, depending on your needs. Consult your operating system documentation for more details on how to write login scripts.

37

Page 41: Walkthrough Guide

ePolicy Orchestrator® 3.6 Walkthrough Guide Deploying the Agent and ProductsDistributing agents

4

Installing the agent manuallyA simple way to install the agent is to run the installer directly from the desired system.

When to use this methodThis is a desirable method to install agents in the following circumstances:

Your organization requires that software is installed on systems manually.

You intend to use ePolicy Orchestrator for policy management only.

You have systems running Windows 95, Windows 98, or Windows ME and do not want to enable file and print sharing on them.

You assigned IP sorting filters or NT domain names when creating the segments of your Directory.

You can install the agent on the system, or distribute the FRAMEPKG.EXE installer to users in your organization and have them run the installation program themselves.

After the agent is installed, it calls into the server and adds the new system to the Directory.

Having assigned IP sorting filters or NT domain names to the desired Directory segments saves valuable time.

Enabling the agent on unmanaged McAfee productsBefore purchasing ePolicy Orchestrator, you may have already been using McAfee products in your network. Some of the more recent McAfee products that use the AutoUpdate updater, such as VirusScan Enterprise, install with the agent in a disabled state. When you want to start managing these products with ePolicy Orchestrator, you do not need to install the agent on these systems. Instead, you can simply enable the agent that is already on the system.

Enabling the agent in this way, rather than re-deploying the 1.5MB agent installation package to each system, can save significant network bandwidth when you have many systems with disabled agents on the network.

Having assigned IP sorting filters or NT domain names to the desired Directory segments saves valuable time.

You must copy the SITELIST.XML repository list file from the ePolicy Orchestrator server to the desired systems. The repository list contains network address information the agent requires to call into the server after installing.

To enable the agent on unmanaged systems running a McAfee product with a disabled agent:

1 Export the repository list (SITELIST.XML) from the ePolicy Orchestrator server and copy it to a temporary folder on the system, such as C:\TEMP.

2 Run the following command line on the desired system:

FRMINST.EXE /INSTALL=AGENT /SITEINFO=C:\TEMP\SITELIST.XML

Note

You cannot change the agent installation folder without uninstalling and reinstalling the agent. Agents that you enable may be in a different folder location than agents that you deploy in your network using another method.

38

Page 42: Walkthrough Guide

ePolicy Orchestrator® 3.6 Walkthrough Guide Deploying the Agent and ProductsDistributing agents

4

/SITEINFO is the location of the SITELIST.XML file that you exported.

Reference the SITELIST.XML file in the temporary folder. By default, the FRMINST.EXE file is installed in the following location:

c:\program files\mcafee\common framework

Including the agent on an imageYou can install the ePolicy Orchestrator agent on systems used to create common images for your environment. The first time the user logs into a system built using a common image that includes the agent, the system is assigned a unique ID called a global unique identifier (GUID).

When to use this methodThe is a desirable method to use when:

Your organization uses standard installation images for new systems.

You may not have access to systems in some portions of your environment except when they are brought in for repair.

For instructions, see the documentation for your preferred image-creation product.

Distributing the agent using other deployment productsYou may already use other network deployment products in your organization to deploy software. You can use many of these tools, such as Microsoft Systems Management Server (SMS), IBM Tivoli, or Novell ZENworks, to deploy agents. Configure your deployment tool of choice to distribute the FRAMEPKG.EXE agent installation package located on your ePolicy Orchestrator server.

For instructions, see the documentation of the desired deployment tool.

Distributing the agent to WebShield appliances and Novell NetWare servers

You cannot use ePolicy Orchestrator to deploy agents to WebShield appliances or Novell NetWare servers. Instead, use a method such as a login script or manual installation.

See your product documentation for specific details.

Note

Such products were most likely installed with an older version of the agent. These agents are not automatically upgraded to the latest agent version that is on the ePolicy Orchestrator server. To upgrade the agent, you should also enable and run the deployment task to install the new agent on the managed system.

Note

Before creating an image for this purpose, remove the agent GUID registry value from the agent registry key. A GUID is regenerated on the first ASCI with the ePolicy Orchestrator server.

Note

These systems require different agents, which can be downloaded from the McAfee web site. These agent installation packages are not installed on the ePolicy Orchestrator server by default.

39

Page 43: Walkthrough Guide

ePolicy Orchestrator® 3.6 Walkthrough Guide Deploying the Agent and ProductsAbout deploying packages

4

About deploying packagesThe ePolicy Orchestrator deployment infrastructure supports deploying products and ePolicy Orchestrator components.

Each McAfee product that ePolicy Orchestrator can deploy provides a product deployment package (PKGCATALOG.z) file. ePolicy Orchestrator can deploy these packages to any of your managed systems, once they are checked into the master repository. The package catalog file contains the product installation files, which are compressed in a secure format.

PKGCATALOG.Z files are used for both virus definition (DAT) and engine update packages.

You can configure product policy settings before or after deployment. McAfee recommends configuring policy settings before deploying the product to network systems, this can save time and ensure that your systems as protected as desired as soon as possible.

Global administrators can check these package types into the master repository with pull tasks, or manually:

Table 4-3 Supported packaged types

Package type Description Origination

Virus definition (DAT) files.

File type: PKGCATALOG.Z

The regular, daily DAT files released by McAfee.

FTPSite and HttpSite update sites, and the McAfee web site.

Use a pull task to download DAT files directly into the master repository, or download and check them into the master repository manually.

Scanning engine.

File type: PKGCATALOG.Z

The updated scanning engine for McAfee anti-virus products, such as VirusScan Enterprise. Engines are usually updated once or twice a year.

FTPSite and HttpSite update sites, and the McAfee web site.

Use a pull task to download engine files directly into the master repository, or download and check them into the master repository manually.

SuperDAT (SDAT.EXE) files.

File type: SDAT.EXE

The SuperDAT files contain both DAT and engine files in one update package.

If bandwidth is a concern, McAfee recommends updating DAT and engine files separately.

McAfee web site.

Download and check SuperDAT files into the master repository manually.

40

Page 44: Walkthrough Guide

ePolicy Orchestrator® 3.6 Walkthrough Guide Deploying the Agent and ProductsAbout deploying packages

4

Package signing and securityAll packages created and distributed by McAfee are signed with a key pair using the DSA (Digital Signature Algorithm) signature verification system, and are encrypted using 168-bit 3DES encryption. A key is used to encrypt or decrypt sensitive data.

You are notified when you check in packages that are not signed by McAfee. If you are confident of the content and validity of the package, continue with the check-in. These packages are secured in the same manner described above, but are signed by ePolicy Orchestrator when they are checked in.

Supplemental virus definition (EXTRA.DAT) files.

File type: EXTRA.DAT

The EXTRA.DAT files address one or a few specific viruses that have appeared since the last DAT file was posted. If the threat has a high severity, distribute the EXTRA.DAT immediately, rather than wait until that signature is added to the next DAT file.

EXTRA.DAT files are from the McAfee web site. You can distribute them through ePolicy Orchestrator.

Pull tasks do not retrieve EXTRA.DAT files.

McAfee web site.

Download and check supplemental virus definition files into the master repository manually.

Product deployment packages.

File type: PKGCATALOG.Z

A product deployment package contains the installation software of a McAfee product.

Product CD or downloaded product ZIP file.

Check product deployment packages into the master repository manually. For a specific location, see the Configuration Guide for the product.

Only the ePolicy Orchestrator agent and System Compliance Profiler deployment packages are checked into the master repository as part of the ePolicy Orchestrator server installation.

Agent installation package.

File type: PKGCATALOG.Z

An agent installation package contains the installation software for the ePolicy Orchestrator agent.

Master repository — checked in at installation.

For future versions of the agent, you must check agent installation packages into the master repository manually.

Agent language packages.

File type: PKGCATALOG.Z

An agent language package contains files necessary to display agent information in a local language.

Master repository — checked in at installation.

For future versions of the agent, you must check agent language packages into the master repository manually.

Table 4-3 Supported packaged types

Package type Description Origination

41

Page 45: Walkthrough Guide

ePolicy Orchestrator® 3.6 Walkthrough Guide Deploying the Agent and ProductsAbout deploying and updating products

4

Using digital signatures guarantees that packages originated from McAfee or were checked in by you, and that they have not been tampered with or corrupted. The agent only trusts package catalog files signed by ePolicy Orchestrator or McAfee. This protects your network from receiving packages from unsigned or untrusted sources.

Legacy product supportOlder products use a flat directory structure in conjunction with the AutoUpdate and AutoUpgrade client tasks to install product updates. New products that take advantage of AutoUpdate 7.0 use a hierarchal directory structure and the update task to install product updates.

If the update location you specify in the AutoUpdate or AutoUpgrade task settings is a distributed repository managed by ePolicy Orchestrator, you must enable legacy product support when you check the corresponding package into the master repository. Doing so copies the packages into both directory structures, enabling you to support legacy products.

Package ordering and dependenciesIf one product update is dependent on another, you must check their packages into the master repository in the required order. For example, if Patch 2 requires Patch 1, you must check in Patch 1 before Patch 2. Packages cannot be reordered once they are checked in. You must remove them and check them back in, in the proper order. If you check in a package that supersedes an existing package, the existing package is removed automatically.

About deploying and updating productsThe ePolicy Orchestrator repository infrastructure allows you to deploy products and update packages to your managed systems from a central location. Although the same repositories are used, there are differences.

Product deployment and updating processThe high-level process for distributing DAT and engine update packages follows:

1 Check the update package into the master repository with a pull task or manually.

Table 4-4 Comparison of product deployment and update packages

Product deployment packages Update packages

Must be manually checked into the master repository.

DAT and engine update packages can be copied from the source repository automatically with a pull task.

Most other update packages must be checked into the master repository manually.

Can be replicated to the distributed repositories and installed on managed systems with global updating.

Can be replicated to the distributed repositories and installed on managed systems automatically with global updating.

If not implementing global updating for product deployment, a deployment task must be configured and scheduled for managed systems to retrieve the package.

If not implementing global updating for product updating, an Update task must be configured and scheduled for managed systems to retrieve the package.

42

Page 46: Walkthrough Guide

ePolicy Orchestrator® 3.6 Walkthrough Guide Deploying the Agent and ProductsAbout deploying and updating products

4

2 If using global updating, nothing else is necessary provided global updating has been configured and enabled.

If not using global updating, use a replication task to copy the contents of the master repository to the distributed repositories.

3 If not using global updating, create and schedule an update or deployment task for agents to retrieve and install the update on managed systems.

Deployment taskOnce you have checked in the product deployment package, you can use the deployment task to install the product on managed systems. The deployment task is a unique client task created automatically when ePolicy Orchestrator installs. It installs any product that is deployable through ePolicy Orchestrator and has been checked into the master repository.

Best practices informationYou can run the product deployment task at any site, group, or individual system. When deciding how to stage your product deployment, McAfee recommends considering the size of the package and the available bandwidth between the master or distributed repositories and the managed systems. In addition to potentially overwhelming the ePolicy Orchestrator server or your network, deploying products to many systems can make troubleshooting problems complicated.

Consider a phased roll-out to install products to groups of systems at a time. If your network links are fast, try deploying to several hundred client systems at a time. If you have slower or less reliable network connections, try smaller groups. As you deploy to each group, monitor the deployment, run reports to confirm successful installations, and troubleshoot any problems with individual systems.

If you chose to deploy server-based McAfee products, deploy them to specific systems, rather than groups or sites.

Update tasksOnce an update package has been checked into the master repository and replicated to the distributed repositories, the agents on the managed systems still need to know when to go to the distributed repositories for updates. This is unnecessary if you are using global updating.

You can create and configure client update tasks to control when and how managed systems receive update packages. If you are not using global updating, creating these client update tasks are the only way you can control client updating with ePolicy Orchestrator.

If you are using global updating, a client update task is unnecessary, although you can create a daily client update task for redundancy.

43

Page 47: Walkthrough Guide

ePolicy Orchestrator® 3.6 Walkthrough Guide Deploying the Agent and ProductsAbout deploying and updating products

4

Considerations when creating client update tasksConsider the following when scheduling client update tasks:

Create a task to update DAT and engine files daily at the highest level of the Directory that is inherited by all systems. If your organization is large, you can use randomization intervals to mitigate the bandwidth impact of all systems updating at the same time. Also, for large networks with offices in different time zones, running the task at the local system time on the managed system, rather than at the same time for all systems, helps balance network load.

Schedule the update task at least an hour after the scheduled replication task, if you are using scheduled replication tasks.

Run update tasks for DAT and engine files at least once a day. Managed systems can be logged off from the network and miss the scheduled task; running the task frequently ensures these systems receive the update.

Maximize bandwidth efficiency and create several scheduled client update tasks that update separate components and run at different times. For example, you can create one update task to update only DAT files, then create another to update both DAT and engine files weekly or monthly — engine packages are released less frequently.

Create and schedule additional update tasks for products that do not use the agent for Windows.

Use the Run missed task option. This can be useful if systems are logged off from the network at the scheduled update time, ensuring they update after logging onto the network.

Global updatingMcAfee recommends using global updating with your updating strategy. Global updating automates replication to your distributed repositories and updating managed systems. Replication and update tasks are not required. Checking contents into your master repository initiates a global update. The entire process should complete within an hour in most environments.

Additionally, you can specify which packages and updates initiate a global update. However, when you only specify that certain content initiates a global update, ensure that you create a replication task to distribute content that was not selected to initiate a global update.

Global updating processGlobal updating updates your environment within an hour in most environments using the following steps:

1 Contents are checked into the master repository.

2 Contents of the master repository are replicated automatically to the distributed repositories.

Note

When using global updating, McAfee recommends scheduling a regular pull task (to update the master repository) at a time when network traffic is minimal. Although global updating is much faster than other methods, network traffic over the updating time period is increased.

44

Page 48: Walkthrough Guide

ePolicy Orchestrator® 3.6 Walkthrough Guide Deploying the Agent and ProductsAbout deploying and updating products

4

3 A SuperAgent wakeup call with the SITESTAT.XML file is broadcast to all agents. This file lists the contents of the master repository. If a package the managed systems requires is in the list, the agent goes to a distributed repository to get the package.

4 All agents go to their local distributed repositories for new updates.

RequirementsThe following requirements must be met to implement global updating:

A SuperAgent is installed on each broadcast segment. Managed systems cannot receive a SuperAgent wakeup call if there is no SuperAgent on the same broadcast segment. Global updating utilizes the SuperAgent wakeup call to alert agents that new updates are available.

Distributed repositories are set up and configured throughout your environment. McAfee recommends SuperAgent repositories, but they are not required — global updating functions with all types of distributed repositories.

If using SuperAgent repositories, managed systems must be able to “see” the repository from which it updates. Although, a SuperAgent is required on each broadcast segment for systems to receive the wakeup call, SuperAgent repositories are not required on each broadcast segment, but the managed systems must “see” the SuperAgent repository from which to update.

Pull tasksUse pull tasks to update your master repository with DAT and engine update packages from the source repository. DAT and engine files must be updated often. McAfee releases new DAT files daily and engine files less frequently. Deploy these packages to managed systems as soon as possible to protect them against the latest threats.

A scheduled pull task runs automatically and regularly at times and days you specify. For example, you can schedule a daily repository pull task at 5:00 AM.

You can also use the Pull now task to check updates into the master repository immediately. For example, when McAfee alerts you to a fast-spreading virus and releases a new DAT file to protect against it.

If a pull task fails you must check the packages into the master repository manually.

Once you have updated your master repository, you can distribute these updates to your systems automatically with global updating or with replication tasks.

Considerations when scheduling a pull taskConsider the following when scheduling pull tasks:

Bandwidth and network usage. If you are using global updating, as recommended, schedule a pull task to run when bandwidth usage by other resources is low. With global updating, the update files are distributed automatically after the pull task completes.

Frequency of the task. DAT files are released daily, but you may not want to use your resources daily for updating.

Note

EXTRA.DAT files must be checked into the master repository manually. They are available from the McAfee web site.

45

Page 49: Walkthrough Guide

ePolicy Orchestrator® 3.6 Walkthrough Guide Deploying the Agent and ProductsAbout deploying and updating products

4

Replication and update tasks. Schedule replication tasks and client update tasks to ensure the update files are distributed throughout your environment.

Replication tasksUse replication tasks to copy the contents of the master repository to distributed repositories. Unless you have replicated master repository updates to all your distributed repositories, some systems do not receive them. Ensure all your distributed repositories are up-to-date.

Scheduling regular replication tasks is the best way to ensure that your FTP, HTTP, and UNC distributed repositories are up-to-date. Scheduling daily replication tasks ensures that managed systems stay up-to-date.

Creating scheduled replication tasks automates replication to your distributed repositories. Occasionally, you may add files to your master repository that you want to replicate to distributed repositories immediately, rather than wait for the next scheduled replication. Run a Replicate now task to update your distributed repositories manually.

Full vs. incremental replicationWhen creating a replication task, select incremental or full replication. Incremental replication uses less bandwidth and copies only the new updates in the master repository that are not yet in the distributed repository. Full replication copies the entire contents of the master repository.

Repository selectionNew distributed repositories are added to the repository list (SITELIST.XML) file containing all available distributed repositories. The agent of a managed system updates its repository list each time it communicates with the ePolicy Orchestrator server. The agent performs repository selection each time the agent (McAfee Framework Service) service starts and when the repository list changes.

Selective replication provides more control over the updating of individual repositories. When scheduling replication tasks, you can choose:

Specific distributed repositories to which the task applies. Replicating to different distributed repositories at different times lessens the impact on bandwidth resources. These repositories can be specified when you create or edit the replication task.

Note

If you are using global updating, replication occurs automatically — replication tasks are not necessary.

Note

With version 3.6, you can now specify which content gets replicated from the master repository to the distributed repositories (defined by the distributed repository), and specify to which distributed repositories are replicated (defined in the task).

Tip

McAfee recommends scheduling a daily incremental replication task and a weekly full replication task. This maximizes network bandwidth efficiency by updating only essential, incremental changes during the week and guarantees completeness.

46

Page 50: Walkthrough Guide

ePolicy Orchestrator® 3.6 Walkthrough Guide Deploying the Agent and ProductsAbout deploying and updating products

4

Specific files and signatures that are replicated to the distributed repositories. Selecting only those types of files that are necessary to each system that checks into the distributed repository lessens the impact on bandwidth resources. When you define or edit your distributed repositories, you can choose which packages you want to replicate to the distributed repository.

Repository selection by agentsBy default, agents can attempt to update from any repository in the repository list (SITELIST.XML) file. The agent can use a network ICMP ping or a subnet address compare algorithm to find the distributed repository with the quickest response time. Usually, this is the closest distributed repository to the system on the network.

You can also tightly control which distributed repositories agents use for updating by enabling or disabling distributed repositories in the agent policy settings. McAfee does not recommend disabling repositories in the policy settings. Allowing agents to update from any distributed repository ensures they receive the updates.

Selective updatingePolicy Orchestrator allows you to select which updates (DAT file, engine, and product-specific updates) you want client systems to receive, so that valuable bandwidth isn’t wasted transferring unnecessary files. You can use selective updating with both global updating and update tasks.

You can also use this feature to selectively update only those components that you will want updated as soon as possible once an update is released. For example, DAT files and VirusScan Enterprise updates.

Due to the challenges customers face, ePolicy Orchestrator 3.6 provides different types of update repositories and several methods for implementing them:

About the SITELIST.XML repository listThe SITELIST.XML file is a repository list containing all of the update repositories you are managing through ePolicy Orchestrator. These include any source repositories, the master repository, and any repositories you have created. The repository list contains the location and network credential information that client systems use to select the nearest repository and retrieve updates.

The ePolicy Orchestrator server sends the repository list to the agent during agent-to-server communication. You can also export it to a file, manually deploy it, then apply it to client systems using command-line options.

Note

This functionality is intended for updating products that are installed on several systems only in your environment, like GroupShield and Webshield. The functionality allows you to distribute such updates only to the distributed repositories these systems check into.

Note

When a new update repository is created, the SITELIST.XML file is updated and the locations to which agents point for updates are adjusted.

47

Page 51: Walkthrough Guide

ePolicy Orchestrator® 3.6 Walkthrough Guide Deploying the Agent and ProductsChecking in product deployment packages manually

4

Checking in product deployment packages manuallyCheck in the PKGCATALOG.Z product deployment package files to the master repository to be able to deploy them using ePolicy Orchestrator.

You must be a global administrator to check in product deployment packages.

To check in a product deployment package:

1 Locate the PKGCATALOG.Z file you want to check in. See the product’s configuration guide for details on the location.

2 Copy the entire contents of the folder containing the package, then save it to a temporary folder on your ePolicy Orchestrator server.

3 In the console tree, select Repository.

4 In the details pane, under AutoUpdate Tasks, click Check in package. The Check-in package wizard appears.

5 Click Next to open the Package Type dialog box.

6 Select Products or updates as the package type, then click Next.

7 Browse to the PKGCATALOG.Z file that you saved in a temporary folder.

8 Click Next to view the package check-in summary information.

9 Click Finish to begin checking in the package. Wait a few minutes while the package checks into the repository.

10 Click Close when complete.

Note

You cannot check in packages to your master repository while pull or replication tasks are executing.

Caution

You must copy all the files in the PKGCATALOG.Z folder, or the package check-in fails.

Figure 4-3 Check-in package wizard

48

Page 52: Walkthrough Guide

ePolicy Orchestrator® 3.6 Walkthrough Guide Deploying the Agent and ProductsConfiguring the deployment task to install products on client systems

4

11 In the console tree, select Repository | Software Repositories | Master.

12 In the details pane, scroll through the list and locate the product and version of the deployment package to verify the action was successful.

13 If you are using distributed repositories in your environment, be sure to replicate the package to them.

Configuring the deployment task to install products on client systems

To deploy products using the product deployment task:

1 In the console tree, select the site, group, or individual system to which to deploy the product.

2 In the details pane, select the Task tab, then double-click Deployment in the task list. the ePolicy Orchestrator Scheduler dialog box appears.

Figure 4-4 Packages list

Figure 4-5 Deployment task for the selected node in the Directory

49

Page 53: Walkthrough Guide

ePolicy Orchestrator® 3.6 Walkthrough Guide Deploying the Agent and ProductsConfiguring the deployment task to install products on client systems

4

3 Select the Task tab and deselect Inherit under Schedule Settings.

4 Under Schedule Settings, select Enable (scheduled task runs at specified time). The task does not run unless you enable it here.

5 Click Settings.

6 On the Deployment tab, deselect Inherit to enable product deployment options.

The Product deployment options list shows which products are available to deploy through ePolicy Orchestrator. The products listed are those for which you have already checked in a PKGCATALOG.Z file to the master repository. If you do not see the product you want to deploy listed here, you must first check in that product’s PKGCATALOG.Z file.

7 Set the Action to Install for the product you want to deploy.

8 To specify command-line install options, click for each item and type the desired command-line options in the Command line text field. See your product documentation for information on command-line options.

9 Click OK to save the product deployment options and return to the ePolicy Orchestrator Scheduler dialog box.

Figure 4-6 ePolicy Orchestrator Scheduler dialog box

Figure 4-7 Task Settings dialog box

50

Page 54: Walkthrough Guide

ePolicy Orchestrator® 3.6 Walkthrough Guide Deploying the Agent and ProductsConfiguring the deployment task to install products on client systems

4

10 In the ePolicy Orchestrator Scheduler dialog box, select the Schedule tab.

11 Deselect Inherit to enable scheduling options.

12 Schedule as desired.

13 Click OK to save your changes.

In the task list on the Tasks tab of the details pane, the Enabled status for the deployment task is set to True.

Once configured, the agents receive the deployment instruction when they call into the ePolicy Orchestrator server.

51

Page 55: Walkthrough Guide

5 Rogue System Detection

Even though you already use ePolicy Orchestrator to manage your security products, your protection is only as good as your coverage. Deploying agents to the systems you know about in your network and keeping them up-to-date is only part of a comprehensive strategy. The next step is ensuring you cover each system that connects to your network.

In any managed network, there are inevitably a small number of systems that do not have an agent on them at any given time. These can be systems that frequently log onto and off from the network, including test servers, laptop systems, or wireless devices. Unprotected systems are often the weak spot of any security strategy, creating entry points by which viruses and other potentially harmful programs can access to your network.

Rogue System Detection helps you monitor all the systems on your network — not only the ones ePolicy Orchestrator manages already, but the rogue systems as well. A rogue system is any system that is not currently managed by an ePolicy Orchestrator agent, but should be.

Rogue System Detection provides real-time detection of rogue systems by means of a sensor placed on at least one system within each network broadcast segment (typically a subnet). The sensor listens to network broadcast messages and spots when a new system has connected to the network.

When the sensor detects a new system on the network, it sends a message to the ePolicy Orchestrator server. The server then checks whether the newly-identified system has an active agent installed and managed. If the new system is unknown to the ePolicy Orchestrator server, Rogue System Detection allows you to take remediation steps including alerting network and anti-virus administrators or automatically deploying an ePolicy Orchestrator agent to the system.

The Rogue System sensorThe sensor is the distributed portion of the Rogue System Detection architecture. Sensors detect systems, routers, printers, and other network devices connected to your network. The sensor gathers information about the devices it detects, and forwards the information to the epolicy Orchestrator server.

The sensor is a small Win32 native executable application. Similarly with an ePolicy Orchestrator SuperAgent, you must have at least one sensor in each broadcast segment, usually the same as a network subnet, in your network. The sensor runs on any NT-based Windows operating system, such as Windows 2000, Windows XP, or Windows 2003.

52

Page 56: Walkthrough Guide

ePolicy Orchestrator® 3.6 Walkthrough Guide Rogue System Detection 5

Passive listening to layer-2 trafficTo detect systems on the network, the sensor utilizes WinPCap, an open source packet capture library. Using WinPCap, the Rogue System sensor captures layer-2 broadcast packets sent by systems connected to the same network broadcast segment. The sensor listens passively to all layer-2 traffic for Address Resolution Protocol (ARP), Reverse Address Resolution Protocol (RARP), and IP traffic. The sensor is able to listen to the broadcast traffic of all devices on its broadcast segment.

The sensor does not actively probe the network to search for which devices are connected.

Intelligent filtering of network trafficThe sensor implements intelligent filtering of network traffic to ignore unnecessary messages and capture only what it needs: Ethernet and IP broadcast traffic. By filtering out unicast traffic, which may contain non-local IP addresses, the sensor focuses only on devices that are part of the local network. For example, if a system on the network happens to be browsing McAfee, packets appear on the local network with the IP address belonging to mcafee.com. The sensor detects systems on your local network only, so it ignores all such unicast packets because their sources cannot be guaranteed to be a local system.

To optimize performance and minimize network traffic, the sensor is designed to limit its communication to the server by only relaying new system detections, and to ignore any re-detected systems for a user-configurable time. For example, the Rogue System sensor detects itself among the list of detected systems. If the sensor sent a message every time it detected a packet from itself, the result would be a network overloaded with sensor detection messages.

The sensor further filters on systems already detected:

The sensor always reports any system the first time it is detected on the network.

The sensor adds the MAC address of each detected system to the packet filter, so that it is not detected again until removed from the filter.

The sensor implements aging on the MAC filter so that after a time period, MAC addresses for systems that have already been detected are removed from the filter, causing those systems to be re-detected and reported to the server.

Data gathering and communications to the serverOnce the sensor detects a system located on the local network, it attempts to gather as much information about that system from the information contained in the network packet. The information gathered includes DNS name, operating system version, and NetBIOS information such as domain membership, system name, and the list of currently logged-in users.

All of the NetBIOS-related information gathered is subject to standard limitations of authorization and other limitations, as documented in the Microsoft management API.

Note

The sensor does not determine whether the system is a rogue system. It detects systems connected to the network and reports these detections back to the ePolicy Orchestrator server.

53

Page 57: Walkthrough Guide

ePolicy Orchestrator® 3.6 Walkthrough Guide Rogue System Detection 5

The sensor packages the gathered information about the detected system into an XML message. It sends this message via secure HTTPS to the ePolicy Orchestrator server for processing. The server then queries the ePolicy Orchestrator database to determine whether the system is a rogue system.

To save bandwidth in large deployments, you can configure how often the sensors send detection messages to the server. You can configure the sensor to cache detection events for a given time period, such as one hour, and then send a single message containing all the events from that time period.

Choosing systems to host sensorsSystems on which the sensor is installed should be likely to remain on and connected to the network all the time, such as a server. If you don’t have a server running in a given broadcast segment, deploy several sensors to several workstations to ensure that at least one of them is connected to the network at any time.

Best practices informationTo guarantee that your Rogue System Detection coverage is complete, you must install at least one sensor in each broadcast segment of your network. Installing more than one sensor in a broadcast segment does not create issues around duplicate messages — the server filters any duplicate detection messages. However, additional active sensors in each subnet results in traffic sent from each sensor to the server. While maintaining as many as five or ten sensors in a broadcast segment should not cause any bandwidth issues, you should not maintain more sensors in a broadcast segment than is necessary to guarantee that the broadcast segment is covered.

Primary and inactive sensorsWhen deploying multiple sensors to the same subnet, you can configure how many are actively reporting to the server at any one time (three by default). These are the primary sensors. Any additional sensors you deploy are backups that remain inactive until the ePolicy Orchestrator server makes them become active.

At regular intervals, the ePolicy Orchestrator server changes primary sensors so that it is not dependant on any one sensor for too long. Also, if the primary sensor is disabled or stops responding, the ePolicy Orchestrator server automatically assigns a different sensor on that broadcast segment the role of primary sensor.

The Subnet List table on the Subnets tab of the Rogue System Detection interface allows you to view the subnets in your network where you already have ePolicy Orchestrator agents. From here you can deploy sensors to systems.

Configure sensor policy settings before deployingBefore you deploy sensors, you should configure the sensor policy settings to suit your needs. These needs are probably the same for all sensors in your environment. Most likely, you can configure sensor policy settings at the Directory root of the console tree and let them inherit throughout the Directory.

54

Page 58: Walkthrough Guide

ePolicy Orchestrator® 3.6 Walkthrough Guide Rogue System Detection 5

Machine status and rogue typeMachine status and rogue type are classifications ePolicy Orchestrator uses to determine which systems are rogue systems. Each detected system is listed in the Machine List table with a status and, if classified as a rogue system, a rogue type. These classifications are very useful for grouping systems in the Machine List table. You can also use status and rogue type as criteria for automatic responses.

Machine status for detected systemsEach detected system has a basic status of Managed, Rogue, Exception, or Inactive. This status is displayed in the Status column of the Machine List table.

Types of rogue systemsSystems with a status of Rogue or Inactive also are assigned a rogue type. These may be systems that are not listed in the database, but are also not necessarily true rogue systems at a given point in time. Rogue types allow you to define what exactly is a rogue system in your network.

For example, a new system may have just logged onto the network. This system had an agent installed with a network login script at its initial logon. Since the initial agent call to the server may take up to ten minutes, the rogue system sensor detects the system before the agent communicates with the server and is added to the database as a managed system. The system is classified as a rogue system, even though it is not really a rogue system because it already has an agent. If you configure automatic responses or automatic e-mail alerts for rogue detections, specifying a reasonable grace period using the Rogue (Grace Period) rogue type can help you minimize false positive detections.

Table 5-1 Types of machine status

Machine Status Description

Managed A system that has an active agent installed and running. The vast majority of systems in the Machine List table should have this status.

Rogue A system that does not have an agent on it.

Exception A system you have identified as an exception. An exception is a piece of network equipment, such as a network router, switch, or printer, that you know does not require an agent.

Inactive A system that is listed in the ePolicy Orchestrator database but has not been detected by a rogue system sensor in a configurable time period. These are mostly likely systems that are shut down or disconnected from the network.

55

Page 59: Walkthrough Guide

ePolicy Orchestrator® 3.6 Walkthrough Guide Rogue System Detection 5

The following table lists and describes each rogue type and its description:

Subnet statusEach subnet listed in the Subnet List table on the Subnets tab receives a status of Covered if there is an active rogue system sensor is installed on a system in that subnet. A subnet has an Uncovered status if there are no sensors present. You can click each subnet to view a list of all systems in the subnet that have an active agent installed.

Table 5-2 Types of rogue systems

Rogue Type Description

No Agent The detected system has no agent installed. This is the most common rogue type.

Grace Period The detected system has no agent installed, but was detected within a user-configured time period, or grace period. This is useful if you have many systems that join and leave the network. It is also useful if you use login scripts to install the agent when new systems log onto the network. Using the grace period allows you to create a time buffer to avoid false positive rogue detections for systems that are not really rogue systems.

The grace period is disabled by default, so all systems without agents are classified as Rogue (No Agent). You might consider enabling the grace period if you are configuring automatic responses for the rogue detection event.

Inactive Agent The detected system has an agent installed, but it has not called into the server for some configurable period of days.

Alien Agent The detected system has an agent installed, but the agent does not report into your server. This can occur if your organization is large and you use multiple ePolicy Orchestrator servers to manage different parts of your network. Laptop users who may travel and log onto your network could have an alien agent. This rogue type is distinct as you probably would not want to take action on these systems as they are already managed. But since they are not managed by your server, you don’t want them to be classified as managed either.

To reduce false positive rogue detections, you can fine-tune automated responses to avoid deploying agents or sending e-mail alerts when alien agents are detected.

Managed For systems with a status of Inactive only. The system has not been detected by a sensor within a configured length of time, but when last detected it did have an agent.

56

Page 60: Walkthrough Guide

ePolicy Orchestrator® 3.6 Walkthrough Guide Rogue System DetectionDistributing Rogue System sensors

5

Distributing Rogue System sensorsThe sensor reports only on detections occurring within its local broadcast segment. You must install at least one sensor per broadcast segment in your network for coverage.

If your organization is large, installing sensors manually on individual systems throughout your network could require more of your time than you can afford. Although you can install sensors manually on managed systems, consider using ePolicy Orchestrator to deploy sensors to appropriate systems throughout your network.

Before distributing sensors, configure the settings on the Rogue System Sensor policy pages.

Deploying Rogue System sensorsYou deploy (send and install) Rogue System sensors from the Subnet List. You can only install sensors to managed systems (systems that are running an ePolicy Orchestrator agent).

You can allow sensor host systems to be selected automatically based on specific criteria, or you can manually select them. As part of the sensor deployment, a Rogue System Sensor Install client task is created for the host systems. This task allows you to uninstall the sensor or upgrade it to a newer version.

If you allow Rogue system Detection to pick systems automatically on the subnet, you can specify criteria for choosing systems. You can specify any or all of the criteria listed here when configuring automatic sensor deployment:

Note

Depending on your network configuration, a broadcast segment may or may not be the same as a subnet.

Note

In the future, network access sensors will be deployed from the Subnet List.

Table 5-3 Automatic sensor deployment criteria

Criteria Description

Most Recent ePO Agent Communication

Most recent agent-server communications indicates a system is more likely to be connected and up-to-date at any given time.

Server OS Servers are more likely than workstations to remain on and connected to the network at all times. Selecting this criterion can help ensure continuous coverage.

Hostname ePolicy Orchestrator can select systems based on a text string you use in the DNS name. For example, if you add an “SRV” prefix to the names of your server systems, you could deploy a sensor to a system with “SRV” in its DNS name.

If you add Hostname to the Selected criteria list, type the text string that appears in your server DNS names in the Hostname text box.

Most Memory Although the sensor is not a memory-intensive application, you can ensure resource efficiency by choosing the criterion.

Fastest CPU Although the sensor is not a processor-intensive application, you can ensure resource efficiency by choosing the criterion.

57

Page 61: Walkthrough Guide

ePolicy Orchestrator® 3.6 Walkthrough Guide Rogue System DetectionTaking actions on detected rogue systems manually

5

For instructions, see the ePolicy Orchestrator 3.6 Product Guide.

Installing the sensor manuallyIf you do not want to deploy sensors from the ePolicy Orchestrator console, you can perform the installation manually. To do so, you must be at the system you want to host the sensor. You must also be using an account that has administrative privileges on the system.

You can install the sensor either via a SETUP.EXE installation wizard or via the command line.

For specific instructions, see the ePolicy Orchestrator 3.6 Product Guide.

Taking actions on detected rogue systems manuallyYou can perform actions on one or more systems listed in the Machine List table. For example, you may want to deploy an agent to a detected rogue system or mark systems for later action. In addition to these manual actions, you can configure automatic responses that can be initiated by a detection event.

The following table lists the manual actions you can take on selected systems in the Machine List table. Some of these are covered in greater detail in following sections.

Table 5-4 Available manual actions

Action Description

Add to ePO tree Adds a system node to a Rogue System site in the Directory. You can place the systems into an appropriate site or group manually after it is added to this site.

Mark for Action Marks the detected system as a system still needing action.

Mark as Exception Marks selected system as a machine that does not require an agent. For example, routers and printers.

Push ePO Agent Instructs the server to deploy an agent to the selected system.

Query ePO agent Queries the detected system to ascertain whether there is an agent installed on it. This query is required for systems to appear as the Alien Agent rogue type.

Consider creating an automatic response that uses this action if you have multiple ePolicy Orchestrator servers in your network. If travellers from other parts of your organization frequently log onto your network, they appear as rogue systems even if they have an agent from another server.

Remove Host Hides the detected system in the Machine List table but does not delete it from the database.

Unmark for Action Unmarks systems that you have already marked for action.

Unmark as Exception Unmarks systems that you have already marked as exceptions.

58

Page 62: Walkthrough Guide

ePolicy Orchestrator® 3.6 Walkthrough Guide Rogue System DetectionConfiguring automatic responses for specific events

5

Configuring automatic responses for specific eventsYou can configure automatic responses so that ePolicy Orchestrator responds automatically to the Rogue System Detection events. There are two specific Rogue System Detection events for which you can configure automatic responses:

Rogue Machine Detected. A new system is found that had not already found in the ePolicy Orchestrator database.

Subnet Uncovered. A subnet in your network, that does not have a rogue system sensor installed, is discovered.

You can also configure responses for any event.

An automatic response can contain one or more of the actions described in the following table. For example, if you configure a response to deploy an ePolicy Orchestrator agent to newly-detected systems, you may also want to send an e-mail to administrators to follow up on the agent installation.

Table 5-5 Actions available for automatic responses

Action Description

Add to ePO tree Adds the system to a Rogue System site within the Directory. After the system is added to this site, you can move the system to an appropriate location manually.

Mark for Action Selects the detected system as a system still needing action.

Mark as Exception Marks selected system as a machine that does not require an agent. For example, routers and printers.

For example, in your organization you may reserve a range of IP addresses within each subnet for network equipment such as routers, switches, and printers. You can create an automatic response to mark such equipment as exceptions and add a condition to initiate the response only if the detected system’s IP address falls within a certain range. Or, maybe you use certain vendors for network equipment that are always different from your vendors for server or workstation systems. In this case, you can use the OUI Org condition to initiate an automatic response to mark systems as exceptions if the system’s MAC address contains a specific vendor code.

Push ePO Agent Instructs the server to deploy an agent to the selected system.

Query ePO agent Queries the detected system to ascertain whether there is an agent installed on it. This query is required when using the Alien Agent rogue type.

Consider creating an automatic response that uses this action if you have multiple servers in your network. If travellers from other parts of your organization frequently log onto your network, they appear as rogue systems even if they have an agent from another server installed.

Remove Host Hides the detected system in the Machine List table but does not delete it from the database.

Send E-mail Sends a pre-configured e-mail message to pre-configured recipients.

Send ePO Server Event Forwards Rogue System Detection and Subnet Uncovered events to the server. This is required if you plan to use Notifications to automatically send e-mail alerts for Rogue System Detection events.

59

Page 63: Walkthrough Guide

ePolicy Orchestrator® 3.6 Walkthrough Guide Rogue System DetectionConfiguring automatic responses for specific events

5

Import and export exceptions from and to an XML fileTo prevent having to identify systems as exceptions again if you need to reinstall the ePolicy Orchestrator server, you can easily save your exceptions list to an XML file. This XML exceptions list preserves your exceptions information so you can re-import it if needed.

For instructions see the ePolicy Orchestrator 3.6 Product Guide.

Unmark for Action Deselects systems that you have already marked for action.

Unmark as Exception Deselects systems that you have already marked as exceptions.

Table 5-5 Actions available for automatic responses

Action Description

60

Page 64: Walkthrough Guide

6 ePolicy Orchestrator Notifications

The ePolicy Orchestrator Notifications feature can alert you to any events that occur on the managed systems in your environment or on the ePolicy Orchestrator server itself. You can configure rules in ePolicy Orchestrator to send e-mail, SMS, or text pager messages (or SNMP traps), as well as run external commands, when specific events are received and processed by the ePolicy Orchestrator server. The ability to specify the event categories that generate a notification message and the frequencies with which notifications are sent are highly configurable.

This feature notifies specified individuals when the conditions of a rule are met. These can include:

Detection of a virus or other potentially unwanted program by your anti-virus software product. Although almost any anti-virus software product is supported, events from VirusScan Enterprise 8.0i include the IP address of the source attacker so that you can isolate the system infecting the rest of your environment.

Outbreak situations. For example, 1000 virus detected events are received within five minutes.

Compliance events from McAfee System Compliance Profiler. For example, systems are found that are not current with the latest Microsoft patches.

High-level compliance of ePolicy Orchestrator server events. For example, a replication task did not complete.

Detection of rogue systems.

This feature also allows you to configure notification rules to execute command lines and launch registered executables when the specified conditions are met.

About NotificationsBefore you plan the implementation of Notifications, you should understand how this feature works with ePolicy Orchestrator and its Directory.

Note

This feature does not follow the inheritance model of policy enforcement.

61

Page 65: Walkthrough Guide

ePolicy Orchestrator® 3.6 Walkthrough Guide ePolicy Orchestrator NotificationsAbout Notifications

6

When events occur on systems in your environment, they are delivered to the ePolicy Orchestrator server, and the notification rules (associated with the group or site that contains the affected systems and each parent above it) are applied to the events. If the conditions of any such rule are met, a notification message is sent, or an external command is run, per the rule’s configurations.

This design allows you to configure independent rules at the different levels of the Directory. These rules can have different:

Thresholds used to send a notification message. For example, a site administrator wants to be notified if viruses are detected on 100 systems within 10 minutes on the site, but a global administrator does not want to be notified unless viruses are detected on 1000 systems within the same amount of time within the entire environment.

Recipients for the notification message. For example, a site administrator wants to receive a notification message only if a specified number of virus detection events occur within the site. Or, a global administrator wants each site administrator to receive a notification message if a specified number of virus detection events occur within the entire Directory.

Throttling and aggregationYou can configure when notification messages are sent by setting thresholds based on aggregation and throttling.

AggregationUse aggregation to determine the thresholds of events at which the rule sends a notification message. For example, you can configure the same rule to send a notification message when the ePolicy Orchestrator server receives 100 virus detection events from different systems within an hour or whenever it has received 1000 virus detection events altogether from any system.

ThrottlingOnce you have configured the rule to notify you of a possible outbreak situation, you may want to use throttling to ensure you do not get too many notification messages. If you are administering a large network, then you may be receiving tens of thousands of events during an hour, creating thousands of notification messages based on such a rule. ePolicy Orchestrator Notifications allows you to throttle the number of notification messages you receive based on a single rule. For example, you can specify in this same rule that you don’t want to receive more than one notification message in an hour.

When using throttling, the notification message received contains a summary of events that occurred within the throttling period that would have triggered the rule otherwise.

62

Page 66: Walkthrough Guide

ePolicy Orchestrator® 3.6 Walkthrough Guide ePolicy Orchestrator NotificationsAbout Notifications

6

Notification rules and Directory scenariosTo show how this feature functions with the Directory, two scenarios are used.

For both scenarios, we can assume that each group, site, and the Directory root of the console tree has a similar rule configured. Each rule is configured to send a notification message when 100 virus infection events have been received from any product within 60 minutes. For reference purposes, each rule is named VirusDetected_<node name>, where <nodename> is the name of the node as it appears in the Directory (for example, VirusDetected_Group2c).

Scenario oneFor this scenario, 100 virus infections are detected in Goup2C within 60 minutes in a single day.

Conditions of the rules VirusDetected_Group2C, VirusDetected_Site2, and VirusDetected_Directory are met, sending notification messages (or launching registered executables) per the rules’ configurations.

Figure 6-1 Console tree

63

Page 67: Walkthrough Guide

ePolicy Orchestrator® 3.6 Walkthrough Guide ePolicy Orchestrator NotificationsDetermining when events are forwarded

6

Scenario twoFor this scenario, 50 virus infections are detected in Group2C and 50 virus infections are detected in Group3B within 60 minutes in a single day.

Conditions of the VirusDetected_Directory rule are met, sending notification messages (or launching registered executables) per the rules’ configurations. This the only rule that can be applied to all 100 events.

Determining when events are forwardedThe ePolicy Orchestrator server receives notifications from the Common Management Agent (CMA). You must configure its policy pages to forward events either immediately to the ePolicy Orchestrator server or only at agent-to-server communication intervals.

If you choose to have events sent immediately (as set by default in ePolicy Orchestrator Agent 3.5.0 McAfee Default policy), the agent forwards all events as soon as they are received. If you want all events sent to the ePolicy Orchestrator server immediately so that they can be processed by Notifications when the events occur, configure the agent to send them immediately.

If you choose not to have events sent immediately, the agent only forwards events immediately that are designated by the issuing product as high priority. Other events are only sent at the agent-to-server communication intervals.

If the currently applied named policy is not set for immediate uploading of events, either edit the currently applied named policy or create a new named policy for the ePO Agent 3.5.0 | Configuration policy pages. This setting is configured on the Events tab of these policy pages.

Figure 6-2 Console tree

64

Page 68: Walkthrough Guide

ePolicy Orchestrator® 3.6 Walkthrough Guide ePolicy Orchestrator NotificationsDetermining which events are forwarded

6

Determining which events are forwardedAlong with being able to determine when events are forwarded to the server, you can also select which events are forwarded.

To select which events are forwarded immediately:

1 In the console tree, select the desired ePolicy Orchestrator database server under Reporting and log onto it with ePolicy Orchestrator authentication.

2 Select Events in the console tree under the database server.

3 Select the Filtering tab in the details pane.

4 Select Send only the selected events to ePO on the Filtering tab.

5 Select the desired events in the list and click Apply.

PlanningBefore creating rules that send notifications, you can save time by planning:

The types of events (both product and server) that could generate and send a notification message in your environment.

Who should receive which notifications. For example, it may not be necessary to notify the site administrator of site B about a failed replication in site A, but you may want all site administrators to know that an infected file was discovered in site A.

Which types and levels of thresholds you want to set for each rule. For example, you may not want to receive an e-mail message every time an infected file is detected during an outbreak. Instead, you can choose to have such an e-mail message sent — at most — once every five minutes, regardless of how often that server is receiving the event.

Which command lines or registered executables you want to run when the conditions of a rule are met.

Note

If you choose not to select which events are forwarded, all events are forwarded. This is the default setting.

Note

You must be a global administrator to make any changes to the Filtering tab.

65

Page 69: Walkthrough Guide

ePolicy Orchestrator® 3.6 Walkthrough Guide ePolicy Orchestrator NotificationsRules

6

RulesRules allow you to define when, how, and to whom, notifications are sent, as well as any executables you want to run when the rule is triggered. You can create or edit rules once you have made some specific configurations to the feature.

But until all of your configurations are complete and you’ve familiarized yourself with the abilities of ePolicy Orchestrator, you can use the default rules provided with the product.

Configuring ePolicy Orchestrator NotificationsTo create and use rules, you need to configure the following in Notifications:

E-mail server from which to send notification messages.

E-mail contacts list from which you select recipients for notification messages.

List of SNMP servers to use while creating rules. You can configure rules to send SNMP traps to SNMP servers when the conditions are met for a rule.

List of external commands to run when the conditions of a rule are met.

These are all configured through the interface of Notifications. For instructions, see the ePolicy Orchestrator 3.6 Product Guide.

Default rulesePolicy Orchestrator provides six default rules that you can enable for immediate use while you learn more about the feature.

Before enabling any of the default rules:

Specify the e-mail server from which the notification messages are sent.

Ensure the recipient e-mail address is the one you want to receive e-mail messages.

Send a test e-mail from the Basic Configuration section of the Configuration tab.

The default rules are described in Table 6-1:

Note

Notification rules do not have a dependency order.

Note

Once enabled, the default rules send notification e-mail messages to the e-mail address you provided on the Set E-mail Address panel of the installation wizard. This is also the Administrator address in both the Notifications and Rogue System Detection contact lists.

You can edit any of the default rules as necessary.

Table 6-1 Default notification rules

Rule name Associated events Configurations

Daily unknown product notification

Any events from any unknown products.

Sends a notification message at most, once a day.

Daily unknown category notification

Any event of an unknown category.

Sends a notification message at most, once a day.

66

Page 70: Walkthrough Guide

ePolicy Orchestrator® 3.6 Walkthrough Guide ePolicy Orchestrator NotificationsViewing the history of Notifications

6

Creating rulesCreating a rule is a four-step process:

1 Describe the rule — Naming the rule and defining the level of the Directory to which it applies.

2 Set filters for the rule — Specifying the products, event categories, and any threat names that apply to the rule.

3 Set thresholds of the rule — Defining the aggregation and throttling of the rule.

4 Configure the notifications for the rule — Defining the messages you want sent, their delivery type, and any executables you want to run when the rules conditions are met.

For complete instructions, see the ePolicy Orchestrator 3.6 Product Guide.

Viewing the history of NotificationsThis feature allows you to view the history of notifications sent. You can view a collective summary of all notifications sent, by product or category, or a list of all the specific notifications sent.

Virus detected and not removed

Virus Detected and Not Removed events from any product.

Sends a notification message:

When the number of events exceeds 1000 within an hour.

At most, once every two hours.

With the source system IP address, actual threat names, and actual product information, if available.

Virus detected heuristics and not removed

Virus Detected (Heuristics) and Not Removed events from any product.

Sends a notification message:

When the number of events exceeds 1000 within an hour.

At most, once every two hours.

With the source system IP address, actual threat names, and actual product information, if available.

Repository Update or Replication Failed

Repository update or replication failed events.

Sends a notification message when any events are received.

Non-compliant computer detected

Non-compliant Computer Detected events.

Sends a notification message:

When any events are received.

Once per each rule of the Compliance Check server task. (This task sends one event per each of the four rules associated with the Compliance Check server task.)

Table 6-1 Default notification rules

Rule name Associated events Configurations

67

Page 71: Walkthrough Guide

ePolicy Orchestrator® 3.6 Walkthrough Guide ePolicy Orchestrator NotificationsViewing the history of Notifications

6

Notification summaryThe Notification Summary page allows you to view a summary of the number of notifications sent by product, category, priority, or rule name:

1 In the console tree, select Notifications.

2 Select the Log tab, then click Summary.

3 Select the Time by which you want to limit the Notification Summary data. These include:

All Times

Last Hour

Last 8 Hours

Last Day

Last Week

4 Select the Site for which you want to limit the Notification Summary data. You can select individual sites or All sites.

5 In Group by, select Product, Category, Priority, or Rule name from the drop-down list, and the quantity of notifications sent for the Group by selection.

Notification listThe Notification List page allows you to view a list of all notifications sent. This list can be sorted by the data of any column by clicking the column title.

1 In the console tree, select Notifications under the desired Directory in the console tree.

2 Select the Log tab, then click List.

3 Click any column title (for example, Notification Type) to sort the list by that column.

Notification detailsClick any notification from the Notification List page to view its details, including:

Note

If the global administrator has not allowed reviewers and site administrators to view Directory notifications and rules, site administrators and site reviewers are limited to viewing only notifications and rules for their sites. Site administrators and site reviewers can never view notifications and rules specific only to other sites.

Note

If the global administrator has not selected to allow reviewers and site administrators to view Directory notifications and rules, site administrators and reviewers are limited to viewing only notifications and rules for their sites. Site administrators and site reviewers can never view notifications and rules specific only to other sites.

Time notification sent Notification rule name

Rule priority Rule site

First event time Rule defined at

68

Page 72: Walkthrough Guide

ePolicy Orchestrator® 3.6 Walkthrough Guide ePolicy Orchestrator NotificationsViewing the history of Notifications

6

Using custom filtersCustom filters provide flexibility to view the notification list. By defining a filter, you can choose to have specific notification log items included or excluded from those displayed.

ePolicy Orchestrator Notifications allows you to create multiple conditions on which to filter the Notification List.

You can filter notification log items based on:

Sites.

Received products.

Actual event categories.

Priority of the notification message.

Rule names.

Actual number of events Actual products

Number of computers Selected products

Affected computer IP addresses

Actual categories

Affected computer names Selected categories

Source computers Actual threat or rule names

Notification status Selected threat or rule names

Notification type Message subject

Event IDs Event descriptions

Affected objects Additional information

69

Page 73: Walkthrough Guide

ePolicy Orchestrator® 3.6 Walkthrough Guide ePolicy Orchestrator NotificationsViewing the history of Notifications

6

Product and component listYou can configure rules to generate notification messages for specific event categories for specific products and components. This is a list of products and components for which you can configure rules and a list of all possible event categories.

Dr. Ahn

Desktop Firewall

Entercept

ePO Server

ePO Agent

GroupShield Domino

GroupShield Exchange

System Compliance Profiler

Symantec NAV

NetShield

NetShield for NetWare

PortalShield

Stinger

ThreatScan

Unknown product

Virex

VirusScan

VirusScan PDA

WebShield

LinuxShield

Note

Checking in additional NAP files can add products to this list.

70

Page 74: Walkthrough Guide

ePolicy Orchestrator® 3.6 Walkthrough Guide ePolicy Orchestrator NotificationsViewing the history of Notifications

6

Event categories for which rules can be configured:

Access Protection rule violation detected and blocked

Access Protection rule violation detected and NOT blocked

Banned content or file detected and NOT removed

Banned content or file detected and removed

Computer placed in quarantine mode

E-mail content filtered or blocked

Encrypted/corrupted file detected and removed

Firewall rule triggered

Virus detected (heuristic) and NOT removed

Virus detected (heuristic) and removed

Unwanted program detected (heuristic) and NOT removed

Unwanted program detected (heuristic) and removed

Intrusion detected

System Compliance Profiler rule violation

Non-compliant computer detected

Normal operation

On-access scan disabled

Policy enforcement failed

Repository update or replication failed

Virus detected and removed

Scan cancelled

Scan line item results

Software deployment failed

Software deployment succeeded

Software failure or error

Spam detected and handled

Unknown category

Unwanted program detected and NOT removed

Unwanted program detected and removed

Update/upgrade failed

Update/upgrade succeeded

Virus detected and NOT removed

Note

Checking in additional NAP files can add event categories to this list.

71

Page 75: Walkthrough Guide

7 Outbreaks

The most effective response to viruses is to know your system, have current anti-virus software installed, detect outbreaks early, then respond quickly and efficiently. An effective strategy includes both prevention as well as response.

The ePolicy Orchestrator software can help reduce the costs of managing an outbreak. When you use ePolicy Orchestrator, you can manage all of your sites from a central location, which makes management easier, more efficient, and ensures consistently applied policies across your enterprise.

This section contains the following topics:

Tasks to do on a daily or weekly basis to stay prepared

Checklist — Are you prepared for an outbreak?

Other methods to recognize an outbreak

Checklist — You think an outbreak is occurring

Tasks to do on a daily or weekly basis to stay preparedYou can use features of the software to help prepare your site or company before an outbreak occurs. Use the Are you prepared for an outbreak? checklist to determine your level of preparedness.

Server and client tasks you should schedule to run regularlyCreate and schedule these server tasks and client tasks to run scans and keep client software up to date with the latest updates. It takes some time to configure and schedule these tasks initially, but after that they should run regularly and automatically.

72

Page 76: Walkthrough Guide

ePolicy Orchestrator® 3.6 Walkthrough Guide OutbreaksTasks to do on a daily or weekly basis to stay prepared

7

You can also re-configure any of these scheduled tasks to Run Immediately should you need to run a particular task manually.

To keep anti-virus and security software on client systems up-to-date, make sure you have the right client tasks created and scheduled for the appropriate parts of your Directory. The following describes a sample of what your client task configuration might look like in a typical deployment.

Table 7-1 Suggested server tasks

Server task Description

Daily DAT & engine pull task

Performs a repository pull for updated weekly DATs or engine files from the default source repository on the McAfee FTP site. The task is scheduled as Hourly, every 6 hours.

Daily incremental repository replication

Replicates only changes to the master repository to all distributed repositories. The task is scheduled as Hourly, every 6 hours.

Weekly full repository replication

A weekly task runs once each Sunday to perform a full replication to all distributed repositories. This extra layer of redundancy is a good way to ensure that all distributed repositories are fully up-to-date at least once a week.

Daily inactive agent task Daily task scans the Directory for systems with agents that have not communicated with the server and places them in an “Inactive Agents” group.

Table 7-2 Suggested client tasks

Client task Task type Description

Daily DAT-only client update task

agent Update Update DATs every day for products using the CMA common updater, such as VirusScan Enterprise.

The task is scheduled to run 4 times every day, starting at 3 am, one hour after your replication server task. Repeat task is selected to repeat the task every 6 hours, so it occurs 4 times a day.

In the Task Settings, select only DAT and EXTRA.DAT. These are updated the most often.

Weekly engine-only client update task

agent Update Update anti-virus engines once a week. McAfee releases new engines only about once every 2-3 months, so save network bandwidth by updating them less frequently than DATs.

In the Task Settings, select only Engine.

Weekly agent patch and service pack update

agent Update Update the agent and security products like VirusScan Enterprise or Desktop Firewall with patches and service packs. Run the task once per week.

In the Task Settings, select all the Service Pack and Patch types. These are updated the most often.

Daily VirusScan 4.5.1 update

VirusScan 4.5.1 for Windows AutoUpdate

Update DATs daily for Windows 9X client systems using VSC 451. Schedule it to run several times a day, similar to the DAT update task for CMA products.

Daily VirusScan 4.5.1 On-Demand Scan

VirusScan 4.5.1 for Windows ODS

Daily ODS scan for VirusScan 4.5.1.

Daily update task for Novell NetWare servers

NetShield for NetWare 4.6 On-Demand Scan

Daily update for NetShield for NetWare on Novell NetWare servers.

73

Page 77: Walkthrough Guide

ePolicy Orchestrator® 3.6 Walkthrough Guide OutbreaksChecklist — Are you prepared for an outbreak?

7

Checklist — Are you prepared for an outbreak?Know your network and specifically what creates traffic, and how much, on it.

The ePolicy Orchestrator software has been fully installed and implemented.

An anti-virus software product has been installed and configured on your systems. For example, McAfee VirusScan Enterprise 8.0i.

Your anti-virus software is up-to-date with the latest virus definition (DAT) files. You are performing regular, scheduled updates of the virus scanning engine and virus definition (DAT) files for each of the anti-virus products that you manage through ePolicy Orchestrator. You can also use reports to determine coverage. For more information and instructions, see the reporting guide.

Turn off all network appliances and services you are not using.

Examine which services need inbound and outbound traffic, and which ports they use. (Specifically, which of the first 1024 ports are used. On your gateway firewall, disallow traffic on ports not used by your appliances and services.

Examine what types of e-mail attachments are acceptable in your environment, and disallow others.

Your Microsoft products running on managed systems are up-to-date with the latest patches and Service Packs. (Generally, Microsoft releases these on a monthy basis.) You can use McAfee System Compliance Profiler to ensure all of your systems are compliant to the latest Microsoft patches and Service Packs.

You have configured Notifications to send a message to you or others when specified events (like a virus detection) are received and processed by the server.

The Rogue System Detection feature is implemented to recognize and deploy agents to rogue systems and devices coming on to your network.

You are performing regular, scheduled updates of products through ePolicy Orchestrator to ensure your security products are running the latest patch or Service Pack.

You have enabled the agent wakeup call and tested the agent’s communication with the systems on your network.

Other methods to recognize an outbreakThere are several key indicators that you can use to determine if your network is experiencing an outbreak. The following key indicators are covered in this section:

Network utilization key indicators.

E-mail utilization key indicators.

Virus detection events.

Network utilization key indicatorsThe following are indicators that network utilization may be affected by an outbreak:

Users complain of slowness. Users are often the first to notice when a full-scale outbreak is taking place. Systems slow down, network systems stop responding, and applications start displaying messages.

74

Page 78: Walkthrough Guide

ePolicy Orchestrator® 3.6 Walkthrough Guide OutbreaksChecklist — You think an outbreak is occurring

7

Monitoring tools (for example, tools from Sniffer Technologies) detect a change in the network utilization levels.

E-mail utilization key indicatorsThe following are indicators that e-mail utilization may be affected by an outbreak:

Users complain of slowness. Users are often the first to notice when a full-scale outbreak is taking place. E-mail slows down or does not work at all.

CPU utilization of Microsoft Exchange servers goes up significantly.

Monitoring tools (for example, tools from Sniffer Technologies) detect a change in the e-mail utilization levels.

Microsoft Exchange Performance Monitor counters register a change in the e-mail utilization levels.

McAfee Outbreak Manager notifies you via e-mail that a potential outbreak may be indicated. McAfee Outbreak Manager analyzes incoming e-mail messages and identifies behaviors that are indicative of an outbreak.

The McAfee WebShield e500 appliance collects data that can help identify if an outbreak is occurring.

Virus detection eventsThe following events are indicators that a virus has been detected:

A notification message is received from the ePolicy Orchestrator server, indicating a virus has been detected.

An ePolicy Orchestrator report identifies that a virus has been detected.

McAfee Outbreak Manager notifies you via e-mail that a potential outbreak may be indicated.

McAfee Alert Manager notifies you that a virus has been detected.

When an outbreak occurs, you can respond in many ways. Use the You think an outbreak is occurring checklist to respond to an outbreak.

Checklist — You think an outbreak is occurringIf you think an outbreak might be occurring, perform the following in your environment:

Visit the AVERT home page to get the latest virus information.

Submit samples of potentially infected files to WebImmune for testing.

Modify the firewall and network security settings to block viral activity. To help you determine what to block and how the virus behaves, visit the Virus Information Library on the AVERT web site.

Increase detection settings for all anti-virus products to meet the threat. Visit the Virus Information Library for an analysis of the threat.

75

Page 79: Walkthrough Guide

ePolicy Orchestrator® 3.6 Walkthrough Guide OutbreaksChecklist — You think an outbreak is occurring

7

Regularly enforce agents with an agent wakeup call, and run coverage reports to determine that protection is in place.

Search for traffic on unexpected ports, then disallow the traffic.

Use the global updating feature to perform the following:

Download supplemental (EXTRA.DAT) and full virus definition (DAT) files.

Update the virus scanning engine.

Perform an on-demand scan of infected systems.

Run anti-virus coverage reports to ensure that anti-virus coverage on infected systems is complete.

If you do not have a McAfee anti-virus product installed or do not have the ePolicy Orchestrator agent deployed to each system, you must manually scan the system or system using the command-line scanner, or use another anti-virus product.

Caution

To ensure full coverage, you must have the ePolicy Orchestrator agent installed on each system.

76

Page 80: Walkthrough Guide

S E C T I O N 2

Lab EvaluationThis section provides instructions for setting up a simple ePolicy Orchestrator implementation in a lab environment.

Installing and setting up

Advanced Feature Evaluations

Page 81: Walkthrough Guide

8 Installing and setting up

This section describes how to install and deploy ePolicy Orchestrator in a test environment. It provides easy steps to get ePolicy Orchestrator 3.6 up and running quickly, and presents important features of the product.

The steps, divided into two sections, are:

Installation and Setup1 Install the ePolicy Orchestrator server and console.

2 Create your Directory of managed systems.

3 Deploy agents to the systems in your Directory.

4 Set up master and distributed repositories.

5 Set VirusScan Enterprise 8.0i policies before deploying.

Maintaining and Monitoring your Environment6 Deploy VirusScan Enterprise to client systems.

7 Run a report to confirm your coverage.

8 Update DAT files with a client update task.

9 Schedule automatic repository synchronization.

10 Test global updating with SuperAgents.

78

Page 82: Walkthrough Guide

ePolicy Orchestrator® 3.6 Walkthrough Guide Installing and setting up 8

What is covered and what is not coveredThis section of the guide does not cover everything that ePolicy Orchestrator can do, for example, many advanced features and installation scenarios typical in real-world deployments. For your live deployment, you can follow many of these basic steps, but you may need more information. For complete information on all aspects of the product, refer to the ePolicy Orchestrator 3.6 Product Guide.

Setting up a lab environmentBefore you install and test ePolicy Orchestrator, you must first create a safe test network. Planning and testing a live deployment is an involved process, especially in a large organization. However, you can create a small test environment in a matter of hours, and if you identify existing systems in your network for testing, the process takes even less time.

A test environment should contain:

One server system to host the ePolicy Orchestrator server.

One or more client systems (servers or workstations) to which you deploy agents and VirusScan Enterprise 8.0i.

Configure your network?Before setting up your test environment, ensure your network is correctly configured for ePolicy Orchestrator:

1 Create trusted domain connections to any remote NT domains. To deploy the agent to systems outside the local NT domain (where the ePolicy Orchestrator server resides), you must create a trusted connection between the domains. This connection is required for the server to deploy agents and install software on remote systems. See your Microsoft Windows documentation for instructions. You must also have a user account with administrator rights in the remote domain.

What is covered What is not covered Comments

Setting up a single ePolicy Orchestrator server and console.

Setting up multiple ePolicy Orchestrator servers and remote consoles.

In a small test environment, one server is enough.

Running MSDE database on the same server as ePolicy Orchestrator.

Running SQL Server databases or remote database servers.

Using the MSDE database packaged with ePolicy Orchestrator is simpler for testing in a small lab network.

Using ePolicy Orchestrator to deploy agents and VirusScan Enterprise.

Using login scripts or third-party tools to deploy agents and VirusScan Enterprise.

Manually installing the agent is also covered.

Setting up a simple network environment with NT domains and Active Directory.

Setting up UNIX, Linux, or NetWare environments

These examples use NT domains and Active Directory to illustrate key product features.

Note

See the ePolicy Orchestrator 3.6 Installation Guide and VirusScan Enterprise 8.0i Installation Guide for complete software and hardware requirements for the ePolicy Orchestrator server, the agent, and VirusScan Enterprise 8.0i.

79

Page 83: Walkthrough Guide

ePolicy Orchestrator® 3.6 Walkthrough Guide Installing and setting up 8

2 Test network connectivity. From the system where you plan to install the ePolicy Orchestrator server, ping client systems where you plan to deploy agents.

On the server, open a command window (Start | Run) and type cmd at the prompt.

Type ping commands to test the system name and IP address:

ping MyComputer

ping 192.168.14.52

3 Confirm that client NT Admin$ share folders are accessible from the server. From the system on which you plan to install the ePolicy Orchestrator server, test access to the default Admin$ share folder on each client system. This access is required for the ePolicy Orchestrator server to install agents and other software, and testing confirms your administrator credentials.

On the ePolicy Orchestrator server, open a command window (Start | Run).

Type the path to the client Admin$ share (use system name or IP address):

\\MyComputer\Admin$

\\192.168.14.52\Admin$

If systems are properly connected over the network, your credentials have sufficient rights, the Admin$ share folder is present, and you see a Windows Explorer dialog box.

4 Install Microsoft updates on Windows 95, Windows 98, or Windows Me client

systems. If your test systems are running Windows 95, Windows 98, or Windows Me, download and install VCREDIST.EXE and DCOM 1.3 updates from the Microsoft web site, as required. ePolicy Orchestrator agents will not run on these systems without the update. See the ePolicy Orchestrator 3.6 Installation Guide or the following links for information:

support.microsoft.com/directory/article.asp?ID=KB;EN-US;Q259403&

www.microsoft.com/com/dcom/dcom95/dcom1_3.asp

5 Enable File and Print Sharing on Windows 95, Windows 98, or Windows Me

client systems. To deploy the agent to systems running Windows 95, Windows 98, or Windows Me, you must first enable File and Print Sharing. After the agent is deployed, you can disable File and Print Sharing and still be able to manage agent policies on those systems.

About the sample lab environment The lab environment used in these examples consists of one NT domain and one Active Directory container, each with several servers and several workstations.

Note

If you install the agent manually or through another method such as login scripts, this step is not required.

80

Page 84: Walkthrough Guide

ePolicy Orchestrator® 3.6 Walkthrough Guide Installing and setting up 8

Having multiple NT domains or Active Directory containers in your lab environment is not required to test ePolicy Orchestrator.

Get installation files from McAfeeBefore you start installing, get the installation files for ePolicy Orchestrator and VirusScan Enterprise from the McAfee web site or your product CD, if you have one. If you want to use the 30-day evaluation versions for your tests, download them from the McAfee web site. The files you need are:

EPO360EML.ZIP. The installation files necessary for installing the ePolicy Orchestrator 3.1 server, console, and database.

VSE800EEN.ZIP. The VirusScan Enterprise 8.0i installation files, including the PkgCatalog.z package file required to deploy VirusScan Enterprise through ePolicy Orchestrator.

VSC451Lens1.ZIP. The VirusScan 4.5.1 installation files and PkgCatalog.z file. You only need VirusScan 4.5.1 if you have client systems running Windows 95, Windows 98, or Windows ME, because VirusScan Enterprise 8.0i does not run on these operating systems.

To download the files from the McAfee web site:

1 From the system on which you plan to install the ePolicy Orchestrator server and console, open a web browser and go to:

http://www.mcafeesecurity.com/us/downloads/evals/

2 Select ePolicy Orchestrator Enterprise Edition 3.6 from the list and click the TRY link.

3 Fill out the form and follow directions to download the EPO360EML.ZIP file.

4 Extract the contents of the EPO360EML.ZIP to a temporary folder, such as C:\ePOTemp.

5 Repeat these steps to download the VSE80iEVAL.ZIP evaluation version of VirusScan Enterprise 8.0i and the VSC451Lens1.ZIP of VirusScan 4.5.1.

6 Extract the contents of the downloaded .ZIP files into a temporary folder on the system you plan to use as your test ePolicy Orchestrator server.

You need to access files in these folders at various times during the deployment process covered in this guide.

Table 8-1 Systems in Domain1 (IP addresses 192.168.14.1-255)

System Details

ePO Server Windows 2000 Server SP 4 running SQL Server 2000 SP 3. This system hosts the ePolicy Orchestrator server, console, database, and master software repository.

4 clients Running Windows 2000 Professional.

Table 8-2 Systems in Domain2 (IP addresses 192.168.15.1-255)

System Details

2 servers Windows 2000 Server SP 4.

3 clients Running Windows 2000 Professional.

81

Page 85: Walkthrough Guide

ePolicy Orchestrator® 3.6 Walkthrough Guide Installing and setting up 8

S T E P

1 Install the ePolicy Orchestrator server and consoleInstall the ePolicy Orchestrator server, console, and database on the system you plan to use as your ePolicy Orchestrator server. In the examples used in this guide, we install the ePolicy Orchestrator server to the system called ePOServer that is running the Windows 2000 Server operating system.

To install the ePolicy Orchestrator console and server:

1 Locate and start the SETUP.EXE file located in the root of the folder where you extracted the EPO360EML.ZIP.

2 Click Next at the initial page of the ePolicy Orchestrator 3.6.0 Setup wizard.

3 If you are installing an evaluation version, click OK at the Evaluation page.

4 Read the license agreement. If you agree to the terms select I accept the terms in the license agreement, then click OK. (If you don’t agree, then click Cancel and quit the product evaluation.)

5 On Installation Options, select Install Server and Console and click Next. You can also change the installation folder if desired.

6 If you see a message box stating that your server does not have a static IP address, ignore it by clicking OK.

While McAfee recommends installing ePolicy Orchestrator on a system with a static IP address in your production environment, a DHCP-assigned IP address can be used for testing purposes.

7 On the Set Administrator Password dialog box, enter the password you would like to use for the ePolicy Orchestrator server. You cannot leave this blank.

8 On the Select Database Server dialog box, select Install a server on this computer and use it. This option installs the free MSDE database included with ePolicy Orchestrator.

9 Click Next.

10 On the Database Server Account dialog box, deselect Use the same account as the Server service, then select This is a SQL Server account. Type in and verify a secure password. This is the SA account that your ePolicy Orchestrator server service uses to access the MSDE database.

11 Click Next to save the database account information.

82

Page 86: Walkthrough Guide

ePolicy Orchestrator® 3.6 Walkthrough Guide Installing and setting up 8

12 On the HTTP Configuration dialog box, change the Agent-to-Server communication port to 82 and the Console-to-Server communication port to 83.

Some HTTP ports (ports 80 and 81 in particular), are commonly used by many HTTP applications and services. Because of this, port 80 may already be in use and not available. McAfee recommends changing the port number to avoid any conflicts.

13 Click Next to save the port information.

If you do see a warning message saying that one or more HTTP ports are in use, click OK and repeat Step 12, this time specifying unused HTTP ports.

14 On the Set E-mail Address dialog box, type the e-mail address to which the default notification rules send messages once they are enabled.

This e-mail address is used by the ePolicy Orchestrator Notifications feature. This feature is covered in this guide, so enter an e-mail address that receives messages you can view.

15 On the Ready to Install dialog box, click Install to begin the installation.

The installation takes approximately 20 minutes to complete and may prompt you to reboot the system during the installation.

16 Click OK when prompted to reboot and be sure to log back in when the system reboots to allow the installation to continue.

17 When the installation is finished, click Finish.

Once the installation is complete, you can open the ePolicy Orchestrator console to begin deploying agents and anti-virus products to the client systems in your network.

Figure 8-1 HTTP Configuration dialog box

83

Page 87: Walkthrough Guide

ePolicy Orchestrator® 3.6 Walkthrough Guide Installing and setting up 8

Start the ePolicy Orchestrator console for the first timeNow your server is installed and running. Open the ePolicy Orchestrator console to begin using ePolicy Orchestrator to manage policies on your network.

To open the console from your ePolicy Orchestrator server:

1 Click the Start button, then select Programs | McAfee | ePolicy Orchestrator 3.6.0 Console.

2 On the Start Page, click Log on to server.

3 When the Log on to Server dialog box appears, make sure the Server name displays the name of your ePolicy Orchestrator server and that the User name is admin, type the Password you set during the installation wizard, then click OK.

4 If you have installed an evaluation version, click OK at the Evaluation splash screen.

Wait a few moments while the ePolicy Orchestrator server initializes. You are now ready to use the ePolicy Orchestrator console.

S T E P

2 Create your Directory of managed systemsThe Directory is in the console tree of the ePolicy Orchestrator console. The Directory lists all the systems in your network that are managed by ePolicy Orchestrator — all systems that are running active ePolicy Orchestrator agents that are reporting to this server.

Before you start managing anti-virus policies for client systems on your network, you must add those systems to your ePolicy Orchestrator Directory. After installing the server, you initially have one system in the Directory — the ePolicy Orchestrator server itself.

To organize your systems, you can group them into logical collections called sites and groups. You can create a hierarchy of sites and groups, much like you would create a hierarchy of folders in Windows Explorer. Grouping is useful for assigning policies and tasks. You can group systems according to any criteria that makes sense for your organization.

This guide uses three common types of grouping:

NT Domain. Using your existing NT network domains as sites makes creating your Directory fast and easy. Having your Directory structure mirror your network structure can also mean you only have to remember one hierarchy, not two.

Active Directory containers. Using your existing Active Directory network containers as sites makes creating your Directory fast and easy. Having your Directory structure mirror your network structure also means you only have to remember one hierarchy.

Servers and workstations. You may want to configure separate policies for products like VirusScan Enterprise 8.0i, depending on whether the software is running on a server or a workstation. Dividing your Directory into groups is not required, especially for testing in a small lab environment. However, you can use groups to experiment with setting policies for groups of systems or for how you might want to organize your Directory.

84

Page 88: Walkthrough Guide

ePolicy Orchestrator® 3.6 Walkthrough Guide Installing and setting up 8

Other typical methods of grouping include, but are not limited to:

Geographical divisions. If you have locations in various portions of the world, or in multiple time zones, you may want to divide your ePolicy Orchestrator Directory according to those divisions. Some of your policy or task coordination is much easier across multiple time zones if you place these systems in such sites.

Security divisions. If users have various levels of security access in your environment, creating your Directory structure to mirror those levels may make enforcing policy much easier.

1 Add systems to your DirectoryThe first step in creating your Directory is to add systems from your network. Try one of these three methods:

Option A: Automatically add entire existing NT domains to your Directory. Very easy and fast. Useful if you plan to deploy agents to every system in that domain. Use this method if you organized your test client systems into domains in your lab network, as in the examples in this guide.

Option B: Automatically add entire Active Directory containers to your Directory. Very easy and fast. Useful if all or part of your environment is controlled by Active Directory and if you want portions of your ePolicy Orchestrator Directory to mirror portions of your Active Directory.

Option C: Manually add individual systems to your Directory. While this may be too slow when deploying ePolicy Orchestrator in a live network, it is fast enough for adding a handful of systems in your test network.

Option A: Automatically add entire existing NT domains to your DirectoryePolicy Orchestrator allows you to import all systems in an NT domain into your Directory with just a few clicks. Use this feature if you organized your test client systems into domains in your lab network.

The examples in this guide use this method to create Directory sites from an NT domain on the test network, Domain1.

To add entire NT domains to your Directory:

1 Right-click the Directory and select New | Site.

2 In the Add Sites dialog box, click Add.

3 In the New Site dialog box, type a name for the site. Make sure the name you type matches exactly the name of your NT domain.

4 Under Type, select Domain and Include computers as child nodes.

5 Click Add under IP Management to specify an IP address range for the site.

6 In the IP Management dialog box, type an IP subnet mask or IP range to specify the IP address ranges of systems that belong to this site.

7 Click OK to save the IP settings.

8 Click OK to save the new site and close the New Site dialog box.

85

Page 89: Walkthrough Guide

ePolicy Orchestrator® 3.6 Walkthrough Guide Installing and setting up 8

9 In the Add Sites dialog box, make sure that Send agent package is NOT selected and click OK to create and populate the sites in the Directory. Although you can deploy agents at this point, you will do that in a later step once we have modified the agent policy settings.

After a few moments, the systems are added to your Directory. When completed, you can see that ePolicy Orchestrator first created a site in the Directory with the name of your network test domain and added all the systems in that domain as children of that domain.

Option B: Automatically add entire Active Directory containers to your DirectoryePolicy Orchestrator allows you to import all systems in an Active Directory container, and its sub-containers, into your Directory with just a few clicks. Use this feature if you organized your test client systems into Active Directory containers in your lab environment.

The examples in this guide use this method to create Directory sites from an Active Directory container, with two sub-containers.

The Active Directory Import wizard is a tool to import Active Directory systems for the first time, while you create the entire Directory, or only a specific site of the Directory. Use the Active Directory Discovery task to poll these Active Directory containers regularly for any new systems.

Figure 8-2 Add Sites dialog box

Note

To use ePolicy Orchestrator software’s Active Directory tools, it is important that both the ePolicy Orchestrator server and the system running the console (if different) can reach the Active Directory server.

86

Page 90: Walkthrough Guide

ePolicy Orchestrator® 3.6 Walkthrough Guide Installing and setting up 8

To add Active Directory containers and sub-containers to your Directory:

1 Right-click Directory, and select New | Site.

2 In the Add Sites dialog box, click Add.

3 In the New Site dialog box, type a name for the site, for example Container1, then click OK.

4 Make sure that Send agent package is NOT selected, then click OK.

5 Right-click Directory, and select All Tasks | Import Active Directory Computers.

6 Click Next when the Active Directory Import wizard appears.

7 On the ePolicy Orchestrator Destination Group panel of the wizard you can select the root or a site of the Directory to import the Active Directory systems.

For the purposes of this guide, select the site you just created from the Import to this ePO location drop-down list, then click Next.

8 On the Active Directory Authentication panel, type Active Directory user credentials with administrative rights for the Active Directory server.

9 In the Active Directory Source Container dialog box, click Browse to select the desired source container in the Active Directory Browser dialog box, then click OK.

10 If you wish to exclude a specific sub-container of the selected container, click Add under Exclude the following sub-containers, then select the desired sub-container to exclude and click OK.

11 Click Next, and view the active log for any new systems that have been imported. Verify in the console tree that these systems were imported.

Figure 8-3 Active Directory Import wizard

Note

If you want to import your entire Active Directory structure, minus exceptions, to use as your ePolicy Orchestrator Directory, select Root from this list. This results in the Active Directory structure, minus exceptions, being imported into the Lost&Found of the Directory root.

87

Page 91: Walkthrough Guide

ePolicy Orchestrator® 3.6 Walkthrough Guide Installing and setting up 8

12 Click Finish.

The Active Directory systems have been imported into the Lost&Found group of the site to which you imported them. If your Active Directory container included sub-containers, the Lost&Found group retains the Active Directory hierarchy.

13 Click and drag the top of this structure from the Lost&Found group, to the site above it. (The site you selected in the wizard. For example Container1.)

Congratulations. You have imported your Active Directory systems into a site in the ePolicy Orchestrator Directory.

In a production environment, once Active Directory containers have been imported, you should create an Active Directory Discovery task. This task regularly polls administrator-specified Active Directory containers for any new systems, and for systems that have been removed. See the ePolicy Orchestrator 3.6 Product Guide for instructions. This task is beyond the scope of this guide.

Option C: Manually add individual systems to your DirectoryWhen you deploy ePolicy Orchestrator in your production network, consider populating the Directory automatically by importing your NT domains or Acitve Directory containers as shown in the previous sections. However, for testing purposes in a small lab environment, you can also add sites, groups to your Directory manually, then add systems to them manually.

To create a new site manually:

1 Right-click Directory node in the console tree and select New | Site.

2 In the Add Sites dialog box, click Add.

3 Type a name for the site, such as Domain1 in our example, into the Name field of the New Site dialog box.

4 Specify an IP mask or address range for the site if needed. See the previous section for details.

5 Click OK. The Domain1 site is added to the Sites to be added list on the Add Sites dialog box.

6 Repeat the previous steps to create additional sites, if desired.

7 Click OK. ePolicy Orchestrator adds the new, empty sites to the Directory.

To add new systems to your site:

1 In the console tree, right-click the site you added and select New | Computer.

2 In the Add Computers dialog box, add new systems either by clicking Browse to locate them in your NT Network Neighborhood, or by clicking Add and typing the system’s NetBIOS name.

3 Click OK once you have added the names of all the systems.

ePolicy Orchestrator adds the new systems to the Directory beneath the site.

88

Page 92: Walkthrough Guide

ePolicy Orchestrator® 3.6 Walkthrough Guide Installing and setting up 8

2 Organize systems into groups for servers and workstationsDepending on how you’ve created your sites, and populated the Directory, you may need to create additional groups and to further levels of organization in your Directory. For example, by operating system.

The example in this guide creates groups in each site for servers and workstations. Use these groups later when setting different VirusScan Enterprise policies for servers and workstations.

To add groups to sites in your Directory and add systems to them:

1 Right-click a site that you added to the Directory and select New | Group.

2 In the Add Groups dialog box, click Add.

3 On the New Group dialog box, type the name Workstations into the Name text box.

4 If your network is designed to allow you to assign specific IP addresses to servers and workstations, create an IP range for the group. For example, in the test network shown in this guide, servers in Domain1 have IP addresses between 192.168.14.200 - 255; workstations in Domain1 have addresses 192.168.14.1 - 199.

To set an IP range for a group:

a Under IP Management on the New Group dialog box, click Add.

b In the IP Management dialog box, type an IP subnet mask or IP range to specify the IP address ranges of systems that belong to this site.

c Click OK to save the IP settings and close the IP Management dialog box.

5 Click OK to close the New Group dialog box. The group is added to the Groups to be added list.

6 Click OK on the Add Groups dialog box to add the group to your Directory.

To add systems to the new groups you created:

Once the new groups appear in the Directory, drag systems from that site into the appropriate group as you would drag files in Windows Explorer. You must drag systems in the Directory one at a time; you cannot select multiple systems. Alternatively, you can use the Directory search feature (right-click Directory and select Search) to move multiple systems at one time.

Note

The VirusScan Enterprise 8.0i policy pages for ePolicy Orchestrator 3.6.0 allow you to set separate policy settings for servers and workstations without creating these groups. However, grouping systems by operating system is a conceptually simple way to illustrate how using Directory groups can make managing policies easier. If needed, create other kinds of groups that better fit your test network or policy management needs.

Note

You must also set an IP mask at the parent site. The IP mask or IP range that you set for the group must be consistent with the IP range specified at the site level. In the examples used in this guide, the workstations and servers in Domain1 all fit within the 192.168.14.0/24 subnet.

Also note that IP management is not necessary for Active Directory systems.

89

Page 93: Walkthrough Guide

ePolicy Orchestrator® 3.6 Walkthrough Guide Installing and setting up 8

While dragging systems into groups, ignore the IP Integrity warning message if you see it by clicking OK.

To create additional groups and subgroups as needed:

Repeat all these steps to create a server group for your site, as well as additional server and workstation groups for other sites, if you have them. You can also make groups within groups. For example, the test network shown in this guide has systems running both Windows 2000 and Windows 98. Due to limitations with older versions of Windows, we need to set different policies for systems running Windows 98. Creating Win98 and Win2K subgroups within our Workstation group makes setting these different policies easier.

Now your test Directory is finished. You have created sites and added systems, either manually or by importing existing NT domains on your network. And you have separated the systems in each site into separate groups for servers and different types of workstation operating systems. You’re ready for the next step—deploying agents.

S T E P

3 Deploy agents to the systems in your DirectoryBefore you can manage the client systems in your Directory, you must install an ePolicy Orchestrator agent on each client system. The agent is a small application that resides on the client system and periodically checks in with the ePolicy Orchestrator server for updates and new instructions.

Deploying the agent from the ePolicy Orchestrator server requires the following:

A network account with administrator privileges. You must specify administrator credentials when you deploy agents.

Domain trusts to other NT domains, if necessary. To deploy agents outside the local NT domain that hosts your ePolicy Orchestrator server, you must have a domain trust relationship configured between the local and target domains.

For Windows 95 and Windows 98 systems, install extra Microsoft updates. Windows 95 and Windows 98 first edition require that you install additional Microsoft updates to be able to run the ePolicy Orchestrator agent. See the ePolicy Orchestrator 3.6 Installation Guide for information on finding and installing these updates. You must install these updates to run the agent on these systems at all, even if you do not use ePolicy Orchestrator to deploy it.

For Windows 95 and Windows 98 systems, turn on file and print sharing. Enable file and print sharing on each client to which you plan to deploy the agent. Note that this is only a requirement to deploy the agent from the ePolicy Orchestrator server, not to manage policies. Once you have deployed the agent to a Windows 95 or Windows 98 system, you can disable file and print sharing.

For Windows 95 and Windows 98 systems, agent installation completes at next logon. After deploying the agent installation package to systems running these operating systems, the installation does not complete until the next time the system logs on to the network.

90

Page 94: Walkthrough Guide

ePolicy Orchestrator® 3.6 Walkthrough Guide Installing and setting up 8

From the Directory in the console tree, you can install the agent on each system in a site at once. To do this, send an agent install command to the site. Because of inheritance, you can specify an agent installation at the parent site (or group) level and all child nodes inherit the command.

Initiate separate agent installations to separate sites of your Directory. These two agent installation commands install the agent to all systems in these sites.

To deploy agents to a site:

1 Configure the agent policy settings before deployment.

2 Deploy agents.

Alternatively, if you do not plan to use ePolicy Orchestrator to deploy the agent, you can install the agent manually from the client system. See Installing agent manually on client systems on page 94.

1 Configure the agent policy settings before deploymentYou can deploy agents with the default policy settings. However, for testing purposes, modify the policy settings to allow the agent tray icon to display in the Windows system tray on the client system. Not only will this expose you to setting agent policies, it also makes it easier to see when the agent has installed on your client systems. When you make this policy change at the site level, it applies to all test systems within this site. This allows you to configure the policy settings once then deploy it to all your systems within a site.

To change the agent policy settings so that the agent icon appears in the system

tray after installation:

1 In the console tree, select the desired site.

2 In the details pane, select the Policies tab, then open ePO Agent 3.5.0 from the list of products.

3 Click Edit at the right end of the Configuration row.

4 Select New Policy from the Policy Name drop-down list. The Create new policy dialog box appears.

5 Provide a New policy name for the policy (for example, New Agent Policy), then click OK. The Policy Settings dialog box appears.

91

Page 95: Walkthrough Guide

ePolicy Orchestrator® 3.6 Walkthrough Guide Installing and setting up 8

6 On the General tab, select Show Agent tray icon.

7 Click Apply All, then click Close. The new policy is created and added to the Policy Catalog page.

8 Click Apply at the end of the Configuration row on the Assign Policies page to assign the new policy to the site selected in the console tree.

To assign the new policy to another Directory node:

1 In the console tree, select the desired Directory node to which you want to assign the new policy.

2 In the details pane, select the Policies tab, then open ePO Agent 3.5.0 from the list of products.

3 Click Edit at the right end of the Configuration row.

4 Select the name of the new policy (for example, New Agent Policy) from the Policy Name drop-down list.

5 Click Apply.

Now your policies are set and your agents are ready to deploy. The next step is to begin an agent install.

2 Deploy agentsUse the Send Agent Install feature to deploy agents to your client systems. Deploy agents to all your test systems in a site at once by initiating the agent installation at your site level in the Directory.

To initiate an agent installation for all systems in a site:

1 In the console tree, right-click the desired site, then select Send Agent Install.

2 Provide credentials with administrator rights on the target systems for the agent installation.

3 Click OK on the Install Agent dialog box to accept all default settings and begin the agent installation.

Figure 8-4 General tab

92

Page 96: Walkthrough Guide

ePolicy Orchestrator® 3.6 Walkthrough Guide Installing and setting up 8

4 Repeat these steps for other sites.

The agent installations begin immediately.

Deploying agents to systems running Windows 95, Windows 98, or Windows MeWhen deploying agents to systems running Windows 95, Windows 98, or Windows Me remember that the installation does not complete until the next time the system logs back onto the network. If, after logging off and back into the Windows 95, Windows 98, or Windows ME client systems, the agent still does not appear, wait 10 minutes, then try deploying it again. If that still does not work, you can install the agent manually at the client system (see Installing agent manually on client systems on page 94).

Deploying to systems outside the local NT domainIf the other site(s) contain systems residing in a different NT domain than your ePolicy Orchestrator server, you may need to specify other domain administrator credentials for the target domain.

Before deploying the agent, deselect Use ePO server credentials on the Install Agent dialog box, and type an appropriate user name and password with domain administrator rights in the target domain.

Monitoring the agent installationsIt may take up to 20 minutes for all the agents to be installed on all systems in your test sites, and for the console tree to update with the new covered status. In the meantime, you can check the ePolicy Orchestrator server for events, which can alert you of failed agent installations. To view server events:

1 In the console tree of the ePolicy Orchestrator console, right-click your server and select Server Events.

2 Skim the Server Event Viewer for events. Successful agent installations are not displayed here, but failed installs are.

When agent deployment is complete and the agents have called back to the server for the first time, the systems in your Directory are marked with green checks.

If the agents have installed and the Directory does not reflect this, manually refresh the Directory by right-clicking Directory and selecting Refresh. Note that the Directory does not show the systems as managed until they call back to the server, usually within 10 minutes. This is true even though the agent is installed and running on the client systems.

You can also watch the installation from any of your client systems. The default policy suppresses the installation interface (which we did not change when we set agent policies in this example). So you cannot see the installation interface. However, you can open the Task Manager on the client system and watch the CPU usage spike briefly as the installation begins. Once the agent is installed and running, two new services appear in the Processes window: UPDATERUI.EXE and FRAMEWORKSERVICE.EXE. Also, because of how we modified the agent policies before deploying, the agent icon appears in the system tray after installing and reporting back to the server.

93

Page 97: Walkthrough Guide

ePolicy Orchestrator® 3.6 Walkthrough Guide Installing and setting upInstalling agent manually on client systems

8

Installing agent manually on client systemsRather than use ePolicy Orchestrator to deploy the agent, you may want to install it manually at the client system. Some administrators may want to install software on client systems manually and use ePolicy Orchestrator to manage policies only. Or, maybe you have many Windows 95 or Windows 98 client systems and do not want to enable print and file sharing on them. In these cases, you can install the agent at the client instead.

Use the FRAMEPKG.EXE file located on your ePolicy Orchestrator server to install the agent. The FRAMEPKG.EXE file is automatically created when you install the ePolicy Orchestrator server. It contains address information for your ePolicy Orchestrator server to allow the new agent to communicate with the server immediately.

By default, FRAMEPKG.EXE is located in the following folder on your ePolicy Orchestrator server:

C:\Program Files\Mcafee\ePO\3.6.0\DB\Software\Current\ EPOAGENT3000\Install\0409

To install the agent manually:

1 Copy the FRAMEPKG.EXE file to the local client or network folder accessible from the client.

2 Run FRAMEPKG.EXE by double-clicking it. Wait a few moments while the agent installs.

At some random interval within ten minutes, the agent reports back to the ePolicy Orchestrator server for the first time. At this point, the system is added to the Directory as a managed system. If you specified IP address filtering for your Directory sites and groups, the client is added to the appropriate site or group for its IP address. Otherwise, the system is added to the Lost&Found group. Once the system is added to the Directory, you can manage its policies through the ePolicy Orchestrator console.

You can bypass the ten-minute callback interval and force the new agent to call back to the server immediately. You do this from any system on which an agent has just been installed.

To manually force the initial agent callback:

1 From the client system where you just installed the agent, open a DOS command window by selecting Start | Run, type command, and press Enter.

2 In the command window, navigate to the agent installation folder containing the CMDAGENT.EXE file.

3 Type the following command (note the spaces between command line options):

CMDAGENT /p /e /c

4 Press ENTER. The agent calls into the ePolicy Orchestrator server immediately.

5 From the ePolicy Orchestrator console on your server, refresh the Directory by pressing F5. The new client system on which you installed the agent should now appear in your Directory.

94

Page 98: Walkthrough Guide

ePolicy Orchestrator® 3.6 Walkthrough Guide Installing and setting upInstalling agent manually on client systems

8

S T E P

4 Set up master and distributed repositoriesNow you have agents installed on your client systems, but what can they do? The purpose of an agent is to allow you to manage client security software policies centrally through ePolicy Orchestrator. But until you have security software installed on the client systems, your agents have nothing to do. The next step is to use ePolicy Orchestrator to deploy VirusScan Enterprise 8.0i anti-virus software to your client systems.

Software deployed with ePolicy Orchestrator is stored in software repositories. There are many ways to set up your repositories. This guide demonstrates a typical example that you can use in your test environment.

About using master and distributed repositories in your test networkePolicy Orchestrator uses repositories to store the software that it deploys. This section illustrates using both master and distributed repositories for deploying software and updating. Repositories store the software, such as the agent or VirusScan installation files, and updates, such as new virus definition (DAT) files, that you plan to deploy to client systems. The master repository is located on the ePolicy Orchestrator server, and is the primary storehouse for your software and updates. Distributed repositories are copies of the master that reside in other parts of your network. Systems in those other parts of your network can update more quickly from local servers than across a WAN to your ePolicy Orchestrator server.

Domains and Active Directory containers can be geographically separated and connected via a WAN. In this case, create a distributed repository, which is simply a copy of the master repository, on a system in the remote location. Systems in that location, Container1 in our example, can update from the distributed repository instead of having to copy updates across the WAN.

Systems in the Domain1 site receive updates and product deployments directly from the master repository, located on the ePolicy Orchestrator server. Systems located in the Container1 site, however, receive them from a distributed repository.

Use the following procedure for using and setting up repositories in your test environment:

1 Add VirusScan Enterprise to the master repository.

2 Pull updates from McAfee source repository.

3 Create a distributed repository.

1 Add VirusScan Enterprise to the master repositoryThe VirusScan Enterprise 8.0i NAP file, allows you to manage VirusScan Enterprise 8.0i policies once it has been installed on client systems in your network. However, to be able to first use ePolicy Orchestrator to deploy VirusScan Enterprise 8.0i to those client systems, you must also check in the VirusScan Enterprise deployment, or installation, package to the master software repository. The deployment package file is called PKGCATALOG.Z and is contained in the VSE80IEVAL.ZIP you downloaded from McAfee (see Get installation files from McAfee on page 81).

To check in the VirusScan Enterprise 8.0i package to your master repository:

1 In the console tree, select Repository.

2 In the details pane, select Check in Package. The Check in package wizard appears.

95

Page 99: Walkthrough Guide

ePolicy Orchestrator® 3.6 Walkthrough Guide Installing and setting upInstalling agent manually on client systems

8

3 Click Next.

4 On the second page of the wizard, select Products or updates, then click Next.

5 Browse to your temporary folder containing your VirusScan Enterprise 8.0i installation files.

6 Locate and select the PKGCATALOG.Z package file, then click Next.

7 At the final wizard page, click Finish to begin the package check-in.

Wait a few moments while ePolicy Orchestrator uploads the package to the repository.

To check in the VirusScan 4.5.1 package (for Windows 95, Windows 98, or

Windows ME client systems):

VirusScan Enterprise 8.0i does not run on Windows 95, Windows 98, or Windows ME. If you have client systems in your test network running these versions of Windows, deploy VirusScan 4.5.1 to these systems. To do this, repeat the same procedure above to check in the VirusScan 4.5.1 deployment package to the software repository. The 4.5.1 package is also called PkgCatalog.z and is located in your temporary folder to which you have extracted the VirusScan 4.5.1 installation files.

2 Pull updates from McAfee source repositoryUse the McAfee HTTP or FTP site as your source repository, from which you can update your master repository with the latest DAT and engine files. Initiate a pull from the source repository to your master repository to:

Test that your ePolicy Orchestrator server can connect over the Internet to the source repository.

Update your master repository with the latest DAT files.

DAT files are updated often, and the DAT files included in your VirusScan Enterprise installation files are not the latest. Pull the latest DAT files from the source repository before deploying VirusScan Enterprise to your network.

Figure 8-5 Check in Package wizard

96

Page 100: Walkthrough Guide

ePolicy Orchestrator® 3.6 Walkthrough Guide Installing and setting upInstalling agent manually on client systems

8

To configure proxy settings:

Your ePolicy Orchestrator server must be able to access the Internet to pull updates from the McAfee source repository.

ePolicy Orchestrator by default uses your Internet Explorer proxy settings. If you have not yet done so, configure your LAN connection for Internet Explorer. Be sure to select the Use proxy for all protocols (both FTP and HTTP) and select Bypass proxy for local addresses options.

Alternatively, you can manually specify proxy server information using the Configure proxy settings option. Refer to the ePolicy Orchestrator 3.6 Product Guide for information on how to do this.

To initiate manual pull from the McAfee source repository:

1 In the console tree, select Repository.

2 In the details pane, select Pull now. The Pull Now wizard appears.

3 Click Next.

4 Select McAfeeFtp, then click Next.

5 If you are managing older products, such as VirusScan 4.5.1 for Windows 95 or 98 systems, be sure to select Support legacy product update.

6 Click Finish to accept all defaults on this page and begin the pull task. The Server Task Log appears.

7 Monitor the task status until it completes.

Now you have checked in VirusScan Enterprise to your master repository and also updated the master repository with the latest DAT and engine files from the McAfee source repository. The systems located in the same domain as your ePolicy Orchestrator server, those systems in your Domain1 site in the Directory in this example, get VirusScan Enterprise from the master repository.

Figure 8-6 Pull Now wizard

97

Page 101: Walkthrough Guide

ePolicy Orchestrator® 3.6 Walkthrough Guide Installing and setting upInstalling agent manually on client systems

8

But where do other systems get their software and updates? If these systems are located in different subnets or a WAN-connected location, it may be more efficient to create a distributed repository that is more easily accessible to these systems.

3 Create a distributed repositoryNow we need to create a distributed repository for Container1 so that those systems can update from there. Your test network, with only a few client systems and one ePolicy Orchestrator server, is small enough to not require a distributed repository structure. However, you can use the distributed repository examples in this guide to simulate a probable real-world scenario. Such a scenario could include systems in remote domains that cannot update efficiently over a WAN-connected master repository on the ePolicy Orchestrator server.

You can use FTP, HTTP, or UNC to replicate data from the master repository to your distributed repositories. This guide describes creating a UNC share distributed repository on one of the systems in the Container1 site.

To do this:

1 Create a shared folder on the system to use as a repository.

2 Add the distributed repository to the ePolicy Orchestrator server.

3 Replicate master repository data to distributed repository.

4 Configure remote sites to use the distributed repository.

1 Create a shared folder on the system to use as a repositoryBefore you add the UNC distributed repository to ePolicy Orchestrator, you must first create the folder to use. In addition, you must set the folder to enable sharing across the network so that your ePolicy Orchestrator server can copy files to it.

To create a shared folder for a UNC distributed repository:

1 From the system on which you plan to host the repository, create a new folder using Windows Explorer.

2 Right-click the folder and select Sharing.

3 On the Sharing tab, select Share this folder.

98

Page 102: Walkthrough Guide

ePolicy Orchestrator® 3.6 Walkthrough Guide Installing and setting upInstalling agent manually on client systems

8

4 Click OK to accept all other defaults and enable sharing for this folder.

2 Add the distributed repository to the ePolicy Orchestrator server

Once you have created the folder to use as the UNC share, add a distributed repository to the ePolicy Orchestrator repository and point it at the folder you created.

To add the distributed repository:

1 From the console tree, click Repository.

2 Select Add distributed repository from in the details pane Repository pane.

3 Click Next at the first page of the wizard.

Caution

Creating a UNC share in this way could be a potential security problem in a production environment, because it allows everyone on your network access to the share. If creating a UNC folder in a production environment, or if you are not sure that your network test environment is secure, be sure to take extra security precautions as necessary to control access to the shared folder. Client systems only require read access to retrieve updates from the UNC repository, but administrator accounts, including the account used by ePolicy Orchestrator to replicate data, require write access. See your Microsoft Windows documentation on how to configure security settings for shared folders.

Figure 8-7 Microsoft Explorer

99

Page 103: Walkthrough Guide

ePolicy Orchestrator® 3.6 Walkthrough Guide Installing and setting upInstalling agent manually on client systems

8

4 Type a Name. Note this is the name that appears in the repository list in the ePolicy Orchestrator console. It does not need to be the same as the name of the shared folder that actually hosts the repository.

5 Select Distributed Repository from the Type drop-down list.

6 Select UNC for the repository configuration and click Next.

7 Type the path of the shared folder you created. Be sure to type a valid UNC path.

8 Click Next.

9 On the download credentials page, deselect Use Logged On Account.

10 Type appropriate domain, user name, and password credentials that client systems should use when downloading updates from this distributed repository.

11 Click Verify to test the credentials. After a few seconds, you should see a confirmation dialog box confirming that the share is accessible to client systems.

If your site is not verified, check that you typed the UNC path correctly on the previous wizard page and that you configured sharing correctly for the folder.

12 Click Next.

13 Enter replication credentials by typing a domain, user name and password in the appropriate text boxes.

The ePolicy Orchestrator server uses these credentials when it copies, or replicates, files from the master repository to the distributed repository. These credentials must have administrator rights in the domain where the distributed repository is located. In our examples, these can be the same credentials used to deploy the agent. See Deploy agents on page 92.

14 Click Verify to test that your ePolicy Orchestrator server can write to the shared folder on the remote system. After a few seconds, you should see a confirmation dialog box confirming that the server can do this.

15 Click Finish to add the repository. Wait a few moments while ePolicy Orchestrator adds the new distributed repository to its database.

16 Click Close.

Figure 8-8 Add repository wizard

100

Page 104: Walkthrough Guide

ePolicy Orchestrator® 3.6 Walkthrough Guide Installing and setting upInstalling agent manually on client systems

8

3 Replicate master repository data to distributed repositoryNow you have created a UNC share on a system to host a distributed repository, and added the repository location to your ePolicy Orchestrator database. Now, all that is missing in the new repository is data. If you browse to your share folder you created, you can see that it is still empty.

Use the Replicate now feature to manually update your distributed repositories with the latest contents from your master repository. Later, we’ll schedule a replication task so this happens automatically.

To initiate replication manually:

1 In the console tree, select Repository.

2 In the details pane, click Replicate now. The Replicate Now wizard appears.

3 Click Next.

4 From the list of available distributed repositories, select the distributed repository you have created, then click Next.

5 Select Incremental replication.

Because this is a new distributed repository, and this is the first time you are replicating to it, you could also select Full replication. However, for future replications, it is recommended to use incremental replication to save time and bandwidth.

6 Click Finish to begin replication. The Server Task Log appears.

7 Monitor the status of the task until it completes.

If you browse to your ePOShare folder now, you can see that it now contains subfolders for agents and software.

4 Configure remote sites to use the distributed repositorySince you have created a distributed repository, why not make sure it gets used? Your test network is too small to really require distributed repositories. But for the sake of simulating how they work, we can configure your updating to force systems in one site to update only from the distributed repository instead of the master.

To simulate this in your test, let’s configure the agent policies for one of the sites to use only the new distributed repository. In our example network used in this guide, this is the Container1 site, which is where the system hosting your newly-created distributed repository resides.

To configure the ePolicy Orchestrator agent policy for the Container1 site to use the distributed repository for updating:

1 In the console tree, select the site whose systems that you want to use the distributed repository.

2 In the details pane, select the Policies tab, then open ePO Agent 3.5.0 from the list of products.

3 Click Edit at the right end of the Configuration row.

4 Select New Policy from the Policy Name drop-down list. The Create new policy dialog box appears.

101

Page 105: Walkthrough Guide

ePolicy Orchestrator® 3.6 Walkthrough Guide Installing and setting upInstalling agent manually on client systems

8

5 Select Duplicate the following policy, then select the policy you created earlier (to display the agent system tray icon) from the drop-down list.

6 Provide a New policy name for the policy (for example, New Agent Policy--custom repository), then click OK. The Policy Settings dialog box appears.

7 Select the Repositories tab, then deselect Inherit.

8 Under Repository selection, select User defined list.

9 In the Repository list, deselect all repositories until only your distributed repository is selected.

10 Click Apply All, then click Close.

11 Click Apply at the end of the Configuration row on the Assign Policies page to assign the new policy to the site selected in the console tree.

Now, when the systems in this site require updates, they retrieve them from the distributed repository.

Again, forcing updates from certain repositories is shown here only for the purposes of simulating distributed repositories in a lab network. This is not something you would do in a production environment, where you would want to have some repository redundancy available for fail-over. Due to faster local network connections, client systems would likely update from a local distributed repository, rather than over a WAN to the master repository, even if not specifically configured to do this. On the other hand, if the distributed repository were unavailable for any reason, the client could still update from other repositories on the network if necessary.

S T E P

5 Set VirusScan Enterprise 8.0i policies before deployingNow that you have created your repositories and added the VirusScan Enterprise deployment package to them, you are almost ready to deploy VirusScan Enterprise to your client systems. Before deploying VirusScan Enterprise, however, let’s modify the policies slightly. Remember the NAP file you checked in? We can use it to configure how VirusScan Enterprise functions once it is installed on the client system. To demonstrate, we’ll use a simple example: changing the policies for workstations to install VirusScan Enterprise 8.0i with minimal user interface. Servers keep the default policy, which is to display the full interface.

This could be a potentially useful implementation in your real network, where you may want to hide the system tray interface on your workstations to prevent end-users from easily changing policies or disabling features.

To set these policies, we’ll use the Workstations groups created when you made your Directory. You can change the policy once for each workstation group (within Domain1 and Container1) to have it inherit to all systems within those groups. For servers, we can leave the default policy, which installs VirusScan Enterprise with the full menu options available in the system tray.

To change the VirusScan Enterprise policies for workstations:

102

Page 106: Walkthrough Guide

ePolicy Orchestrator® 3.6 Walkthrough Guide Installing and setting upInstalling agent manually on client systems

8

1 In the console tree, select your workstations group.

2 In the details pane, select the Policies tab.

3 Select VirusScan Enterprise 8.0.0, then click Edit at the end of the User Interface Policies row.

4 Select New Policy from the Policy Name drop-down list. The Create new policy dialog box appears.

5 Provide a New policy name for the policy (for example, Workstation UI), then click OK. The Policy Settings dialog box appears.

6 Select Workstation from the Settings for drop-down list at the top of the page.

7 Deselect Inherit to enable user interface policy options.

8 Select Show the system tray icon with minimal menu options.

9 Click Apply, then click Close.

10 Click Apply at the end of the Configuration row on the Assign Policies page to assign the new policy to the site selected in the console tree.

11 Repeat these steps for any other workstation groups in your Directory.

S T E P

6 Deploy VirusScan Enterprise to client systemsYou have created master and distributed repositories, added the VirusScan Enterprise 8.0i PKGCATALOG.Z file to your master repository, and replicated this to a new distributed repository. Your systems are added to your Directory and they all have ePolicy Orchestrator agents installed on them. You’ve defined your VirusScan Enterprise policies for servers and workstations. You are now ready to have ePolicy Orchestrator deploy VirusScan Enterprise on all the client systems in your test network.

Unlike deploying agents, which must be done at the site, group, or system level, you can deploy VirusScan Enterprise from the Directory level of the console tree to install it on all the systems in your Directory at once. Note that whatever policies you have set for specific sites or groups within your Directory, such as the Servers and Workstations groups in this example, still apply when VirusScan Enterprise is installed to client systems within those groups. Alternatively, you can deploy VirusScan Enterprise to sites, groups, or individual systems — the procedure is the same.

To deploy VirusScan Enterprise 8.0i to all systems in the Directory:

1 In the console tree, select Directory.

2 In the details pane, select the Task tab, then double-click the Deployment task in the task list. The ePolicy Orchestrator Scheduler appears.

Note

The Settings for drop-down list allows you to set separate policies for servers and workstations without using Directory groups. ePolicy Orchestrator detects the operating system on the client system and applies the right policy. However, for testing purposes, it can be useful to create server and workstation groups.

103

Page 107: Walkthrough Guide

ePolicy Orchestrator® 3.6 Walkthrough Guide Installing and setting upInstalling agent manually on client systems

8

3 Click the Task tab and deselect Inherit under Schedule Settings.

4 Under Schedule Settings, select Enable (scheduled task runs at specified time).

5 Click the Settings button.

6 On the Deployment page, deselect Inherit to enable product deployment options.

7 Set the Action for the VirusScan Enterprise 8.0i deployment task to Install.

8 Click OK to save the product deployment options and return to the ePolicy Orchestrator Scheduler dialog box.

9 On the ePolicy Orchestrator Scheduler dialog box, click the Schedule tab.

10 Deselect Inherit to enable scheduling options.

11 From the Schedule Task drop-down list, select Run Immediately.

12 Click OK to save your changes.

In the task list on the Tasks tab of the details pane, the Enabled status for the deployment task is set to True.

You have now configured your default deployment task to install VirusScan Enterprise on all client systems in your test site. The deployment occurs the next time the agents call back to the ePolicy Orchestrator server for updated instructions. You can also initiate an agent wakeup call to have the deployment occur immediately. See Send an agent wakeup call to force agents to call back immediately on page 105.

To deploy VirusScan 4.5.1 to Windows 95, Windows 98, or Windows ME

systems:

If you have any Windows 95, 98, or ME systems in your test network, you can repeat the steps in this section to deploy VirusScan 4.5.1 to these systems only. Make sure you have already checked the VirusScan 4.5.1 deployment package into the repository. Deploying VirusScan 4.5.1 to several systems is easiest if you have organized your Windows 95, Windows 98, or Windows ME systems into a group in your Directory, but you can also run the deployment task for individual systems too.

1 In the console tree, select the desired group or system.

2 In the details pane, select the Task tab, then double-click the Deployment task in the task list. The ePolicy Orchestrator Scheduler appears.

Figure 8-9 ePolicy Orchestrator Scheduler dialog box

104

Page 108: Walkthrough Guide

ePolicy Orchestrator® 3.6 Walkthrough Guide Installing and setting upInstalling agent manually on client systems

8

3 Click the Task tab and deselect Inherit under Schedule Settings.

4 Under Schedule Settings, select Enable (scheduled task runs at specified time).

5 Click the Settings button.

6 On the Deployment page, set VirusScan 4.5.1 to Install.

7 Complete the steps to configure the deployment. ePolicy Orchestrator deploys VirusScan 4.5.1 the next time the agents on these systems call back to the server.

Send an agent wakeup call to force agents to call back immediatelyIf you want, you can send the agents an immediate agent wakeup call. This forces the agents to check in immediately with the ePolicy Orchestrator server, rather than wait for the next regularly scheduled agent callback, which by default could be as long as 60 minutes. When the agents call back, they see that the VirusScan Enterprise deployment is set to install rather than ignore. The agents then pull the VirusScan Enterprise PkgCatalog.z file from the repository and install VirusScan Enterprise. Note that each agent pulls the PkgCatalog.z file from whichever repository it is configured to. In our example test network, the systems in the Domain1 site pull from the master repository and systems from Container1 pull from the distributed repository we created.

You can send an agent wakeup call to any site, group, or individual system in your Directory. Since we want to wake up all systems in the Directory, we’ll initiate one wakeup call for each site, which inherit down to groups and systems within that site.

To send an agent wake-up call to begin VirusScan Enterprise deployment

immediately:

1 Right-click the target site in the console tree and select Agent Wakeup Call.

2 Set the Agent randomization to 0 minutes.

3 Click OK to accept all other defaults and send the wakeup call.

4 Repeat these steps for other sites in your Directory.

Figure 8-10 Agent Wakeup Call dialog box

105

Page 109: Walkthrough Guide

ePolicy Orchestrator® 3.6 Walkthrough Guide Installing and setting upInstalling agent manually on client systems

8

The agents call back immediately, retrieve the new deployment policy changes, and begin installing VirusScan Enterprise. Wait a few minutes while VirusScan Enterprise 8.0i is deployed and installed.

To verify that the software has successfully installed on client systems check one

of the following:

Run a Product Protection Summary report.

The MCSHIELD.EXE process is running and visible in the Processes tab of your Windows Task Manager.

A VirusScan folder is added to your Program Files/McAfee folder.

As long as you did not change the policy to hide it, the VShield icon appears in the system tray next to the agent icon. You may need to reboot to display the system tray icon. Note that VirusScan is active and running even if the VShield icon has not yet displayed in the system tray.

S T E P

7 Run a report to confirm your coverageRun a Product Protection Summary report to confirm that your VirusScan Enterprise deployment was successful. Note that you may need to wait an hour before the database has been updated with the new status.

To run a Product Protection Summary report:

1 In the console tree, select Reporting | ePO Databases | ePO_ePOServer. ePOServer is the name of the ePolicy Orchestrator database used in this example.

2 If you are prompted to log into the database, type your MSDE user name and password that you created when installing the console and database.

3 Select Reports | Anti-Virus | Coverage | Product Protection Summary.

4 Select No when prompted to set a data filter. Wait a moment while ePolicy Orchestrator generates the report.

Once the report has generated, the results should show the number of servers and workstations on which VirusScan 4.5.1 and VirusScan Enterprise 8.0i are currently installed. If you later deploy other products, such as McAfee Desktop Firewall, they show up in this report as well.

S T E P

8 Update DAT files with a client update taskOne of the most common things you will want to do with ePolicy Orchestrator is update DAT files. VirusScan Enterprise by default performs an update task immediately after installing. So, if you followed the steps in this section to configure your repositories and pulled the latest DAT files to your master repository before deploying, VirusScan Enterprise is up-to-date shortly after being deployed.

106

Page 110: Walkthrough Guide

ePolicy Orchestrator® 3.6 Walkthrough Guide Installing and setting upInstalling agent manually on client systems

8

Once VirusScan Enterprise is installed, however, update DAT files frequently. Your anti-virus software is only as good as its latest DAT files, so it is essential to keep them up-to-date. In a later section in this guide, you will see how to schedule a regular automatic client update task to occur regularly, such as daily or weekly. For now, let’s assume you want to initiate an immediate DAT file update. You will likely be required to do this at some point; for example, if McAfee releases updated DAT files in response to a newly-discovered virus and you want your client systems to update without waiting for their regularly scheduled task.

To do this, create and run a client update task from your ePolicy Orchestrator console. This forces all your client anti-virus software to perform an update task.

To create and run a client update task:

1 In the console tree, right-click Directory | All Tasks | Schedule task.

2 In the Schedule Task dialog box, type a name into the New Task Name field, such as Update client DATs.

3 In the software list, select ePolicy Orchestrator Agent | Update for the task type.

4 Click OK.

5 Go to the Tasks tab in the details pane, then press F5 to refresh the console and make the new task appear in the list on the Task tab.

Note that it is scheduled to run daily at the current day and time. Also note that the Enabled flag is set to False—we now need to set this to True and run it immediately.

6 Right-click the new task in the task list and select Edit Task.

7 Deselect Inherit under the Schedule Settings section of the ePolicy Orchestrator Scheduler dialog box.

Note

Before you run a client update task, make sure you have first pulled any updated DAT or engine files into your master and distributed repositories, if you have them. See Set up master and distributed repositories on page 95.

Figure 8-11 ePolicy Orchestrator Scheduler dialog box

107

Page 111: Walkthrough Guide

ePolicy Orchestrator® 3.6 Walkthrough Guide Installing and setting upInstalling agent manually on client systems

8

8 Select Enable.

9 Click Settings, then deselect Inherit on the Update tab.

10 Ensure that This task updates only the following components is selected. This selection allows you to specify which components you want to update. Specifying these allows you to save network resources by limiting which updates are distributed in your environment.

11 Leave the default selections under Signatures and Engines.

12 Under Patches and Service Packs, select VirusScan Enterprise 8.0, then click OK.

13 Click the Schedule tab and deselect Inherit.

14 Set the Schedule Task option to Run Immediately and click OK.

15 Initiate agent wakeup calls to all sites in your Directory so your agents call in immediately to pick up the agent update task. See Send an agent wakeup call to force agents to call back immediately on page 105.

How can I tell that VirusScan Enterprise has actually updated to the latest DATs?First, check the DAT version that is currently checked into your master repository. These are the DATs that should now be on your client systems after they updated. To do this:

1 From the console tree, select the ePolicy Orchestrator server, then select the General tab.

2 Under MyAVERT Security Threats, check which DAT file version is Current in Repository. This should be a 6-digit number like 4.0.4576.

Next, check the DAT versions used by client software, such as VirusScan Enterprise, from the ePolicy Orchestrator console. Note that the console does not show the updated status until the next time the agent calls into the server as part of its regular agent-to-server communication. To do this:

1 In the console tree, select any system that has recently been updated.

2 In the details pane, select the Properties tab, then select VirusScan Enterprise 8.0i | General to expand the list of general properties.

3 Check the DAT Version number. It should match the latest DAT version in your master software repository.

S T E P

9 Schedule automatic repository synchronizationIn just a few hours, you now have a fully-functional installation of ePolicy Orchestrator deployed in your test network. You have agents deployed to client systems, and these agents are active and calling back to the server for updated instructions regularly. You’ve also used ePolicy Orchestrator to deploy VirusScan Enterprise to your client systems, and have created a small software repository that you can use to deploy updates and additional software to your client systems.

108

Page 112: Walkthrough Guide

ePolicy Orchestrator® 3.6 Walkthrough Guide Installing and setting upInstalling agent manually on client systems

8

The next step is to schedule regular pull and replication tasks to synchronize your source, master, and distributed repositories so that all your repositories are up-to-date. Then create a scheduled client update tasks to make sure client software such as VirusScan Enterprise checks regularly for updated DAT and engine files.

To do this:

1 Schedule a pull task to update master repository daily.

2 Schedule a replication task to update your distributed repository.

3 Schedule a client update task to update DATs daily.

1 Schedule a pull task to update master repository dailyPull tasks update your master software repository with the latest DAT and engine updates from the source repository. By default, your source repository is the McAfee web site. Let’s create a scheduled pull task to pull the latest updates from the McAfee web site once per day.

To schedule a pull task:

1 In the console tree, select Repository.

2 In the details pane, select Schedule pull tasks to open the Configure Server Tasks page.

3 Select Create task to open the Configure New Task page.

4 Type a name into the Name field, such as Daily Repository Pull task.

5 Select Repository Pull from the Task type drop-down menu.

6 Make sure Enable task is set to Yes.

7 Select Daily from the Schedule Type drop-down list.

8 Schedule the day and time for the task to run.

Figure 8-12 Configure New Task page

109

Page 113: Walkthrough Guide

ePolicy Orchestrator® 3.6 Walkthrough Guide Installing and setting upInstalling agent manually on client systems

8

9 Click Next at the top of the page.

10 Select NAIHttp in the Source repository drop-down list.

11 Leave the destination branch set to Current.

12 If you have older versions of McAfee products, such as VirusScan 4.5.1, in your test network, select Support Legacy product update.

13 Click Finish. Wait a moment while the task is created.

The new pull task is added to the Configure Server Tasks page.

2 Schedule a replication task to update your distributed repositoryUsing your new pull task, your ePolicy Orchestrator server is configured to automatically update the master repository with the latest updates from the source repository on the McAfee web site. The task runs once a day and keeps your master repository current.

But an up-to-date master repository won’t be of any use to those client systems on your network that get their updates from a distributed repository, such as the systems in the Container1 site in our sample test network. The next step, therefore, is to make sure the updates added to your master repository are also automatically replicated to your distributed repository. To do this, create a replication task and schedule it to occur every day after the scheduled pull task you already created.

To schedule a replication task:

1 In the console tree, select Repository.

2 In the details pane, select Schedule pull tasks to open the Configure Server Tasks page.

3 Select Create task to open the Configure New Task page. This is the same page that you used to schedule your automatic pull task.

4 Type a Name, such as Daily Distributed Repository Replication task.

5 Select Repository Replication from the Task type drop-down menu.

6 Make sure Enable task is set to Yes.

7 Select Daily from the Schedule Type drop-down list.

8 Schedule the day and time for the task to run. Make sure you set the time for the task to at least five minutes after the pull task is scheduled.

9 Click Next at the top of the page.

10 Select Incremental replication and click Finish. Wait a moment while the task is created.

The new replication task appears in the Configure Server Tasks table along with your scheduled pull task.

3 Schedule a client update task to update DATs dailyAfter all your repositories have been updated, schedule a client update task to make sure that VirusScan Enterprise gets the latest DAT and engine updates as soon as they are in your repositories.

110

Page 114: Walkthrough Guide

ePolicy Orchestrator® 3.6 Walkthrough Guide Installing and setting upUse SuperAgents to wake up all agents on the network

8

You can use the client update task you created earlier after you deployed VirusScan Enterprise (see Update DAT files with a client update task on page 106). Simply modify the schedule of this task from Run Immediately to Daily and set the start time to run about an hour after your replication task begins.

S T E P

10 Test global updating with SuperAgentsGlobal updating can automatically update all your client systems every time you check new updates into your master repository. Every time you change your master repository, ePolicy Orchestrator automatically replicates the contents to any distributed repositories you have. Then it alerts all agents deployed in your network that have managed products, such as VirusScan Enterprise 8.0i, to perform an immediate update task.

The global updating feature is useful in a virus outbreak situation. Assume that McAfee’s AVERT team has posted updated DAT files in response to a newly-discovered virus. With global updating enabled, you simply initiate a pull task from your ePolicy Orchestrator console to update your master software repository with the new DAT files. ePolicy Orchestrator’s global updating feature does the rest—updating the DAT files for all systems running active, communicating agents on your network within an hour.

Use SuperAgents to wake up all agents on the networkePolicy Orchestrator uses something called a SuperAgent to initiate the global update. SuperAgents are ePolicy Orchestrator agents that can also wake up other agents located in the same network subnet. When you have a SuperAgent installed in each network subnet, you send a SuperAgent wakeup call to your SuperAgents, and then the SuperAgents send wakeup calls to the ePolicy Orchestrator agents in the same subnet. The regular agents can then call back to the ePolicy Orchestrator server for policy instructions and update client software.

To enable global updating:

1 Convert an agent on each subnet into a SuperAgent.

2 Enable global updating on ePolicy Orchestrator server.

Note

SuperAgents can also act as distributed repositories. These SuperAgent repositories use a proprietary McAfee replication protocol called SPIPE, and can either replace or augment other HTTP, FTP, or UNC distributed repositories you have created. This guide does not cover SuperAgent repositories, however. Refer to the ePolicy Orchestrator 3.6 Product Guide for information on SuperAgent repositories.

111

Page 115: Walkthrough Guide

ePolicy Orchestrator® 3.6 Walkthrough Guide Installing and setting upUse SuperAgents to wake up all agents on the network

8

1 Convert an agent on each subnet into a SuperAgentYou can turn any regular ePolicy Orchestrator agent into a SuperAgent. Use the ePolicy Orchestrator Agent policy pages to do this. Since you only need one SuperAgent per network subnet, be sure to configure SuperAgents for individual systems in your Directory, and not for whole groups or sites as you did when deploying agents or VirusScan Enterprise.

For example, in the sample test network used in this guide, we would convert one agent into a SuperAgent in the Domain1 site.

To do this:

1 In the console tree, select a desired system to host the SuperAgent. In a production environment, you would want to select a system that is likely to be up and running all the time.

2 In the details pane, open ePO Agent 3.5.0.

3 Click Edit at the right end of the Configuration row.

4 Select New Policy from the Policy Name drop-down list. The Create new policy dialog box appears.

5 Select Duplicate the following policy, then select the policy you created earlier (to display the agent system tray icon) from the drop-down list.

6 Provide a New policy name for the policy (for example, SuperAgent Policy), then click OK. The Policy Settings dialog box appears.

7 On the General tab, select Enable SuperAgent functionality.

8 Click Apply All, then click Close.

9 Click Apply at the end of the Configuration row on the Assign Policies page to assign the new policy to the site selected in the console tree.

You can also create a SuperAgent repository on the system, but they are not required for global updating and are not covered in this guide. See the ePolicy Orchestrator 3.6 Product Guide for information on SuperAgent repositories.

10 Click Apply All to save the policy changes.

11 Right-click the system in the Directory and select Agent Wakeup Call.

12 Set Agent Randomization to 0 and click OK.

13 Repeat these steps if you have systems in other network subnets.

Wait a few moments while the SuperAgent is created.

You can use these SuperAgents to wake up other agents in the local subnet. This can save bandwidth, especially in a large network with many remote, WAN-connected sites. Send out wakeup calls to a few SuperAgents and let them wake up the other agents in the local LAN.

112

Page 116: Walkthrough Guide

ePolicy Orchestrator® 3.6 Walkthrough Guide Installing and setting upUse SuperAgents to wake up all agents on the network

8

2 Enable global updating on ePolicy Orchestrator serverGlobal updating is a feature that you can turn on or off from the ePolicy Orchestrator console. When turned on, selected changes to your master repository trigger an automatic replication to distributed repositories, if any, followed by a SuperAgent wakeup call to your entire Directory. The SuperAgents in turn wake up agents in their local subnets.

To enable on global updating:

1 In the console tree, select your ePolicy Orchestrator server.

2 In the details pane, select the Settings tab.

3 At the bottom of the Server Settings page, set Enable global updating to Yes.

4 For the purposes of this evaluation change the Global updating randomization interval to 1 minute.

5 Leave the default selections under Signatures and Engines.

6 Under Patches and Service Packs, select VirusScan Enterprise 8.0.

7 Click Apply Settings to save the change.

Now that you have SuperAgents deployed to subnets your network and global updating enabled, any time you change the DAT files, engine files, or VirusScan Enterprise 8.0i files in your master repository, the changes automatically replicate to your repositories. Once that replication is completed, the ePolicy Orchestrator server sends a SuperAgent wakeup call to the SuperAgents. The SuperAgents in turn send out a wakeup call to all agents in the local subnet. Those agents check in with the server and download policy changes. From checking in the changes to your master repository to your last client system receiving its update, this process should take no longer than one hour.

S T E P

11 Where to go from here?By now you have had a chance to explore most of the major features of ePolicy Orchestrator 3.6.0. But there is also much more you can do with ePolicy Orchestrator and VirusScan Enterprise. Please refer to the ePolicy Orchestrator 3.6 Product Guide, the VirusScan Enterprise 8.0i Product Guide, and the VirusScan Enterprise 8.0i Configuration Guide for complete information on advanced product features. These and other helpful resources are available for download from the McAfee web site.

113

Page 117: Walkthrough Guide

9 Advanced Feature Evaluations

This section of the guide demonstrates how you can configure and use two of the advanced features not covered in the previous section:

ePolicy Orchestrator Notification.

Rogue System Detection on page 118.

ePolicy Orchestrator NotificationReal-time information about threat and compliance activity on your network is essential to your success.

You can configure rules in ePolicy Orchestrator to notify you when user-specified threat and compliance events are received and processed by the ePolicy Orchestrator server. The ability to set aggregation and throttling controls on a per rule basis allows you to define when, and when not, notification messages are sent.

Although you can create any number of rules to notify you of almost any threat or compliance event sent by your security programs, the focus in this guide on this feature is more narrow, centering on an e-mail notification message in response to a virus detected event.

In this section of the guide, you will:

1 Configure Notifications.

2 Create a rule for any VirusScan Enterprise event.

3 Providing a sample virus detection.

S T E P

1 Configure NotificationsBefore setting up any rules, you must define who is going to receive the notification message, in which format, and what the message communicates:

114

Page 118: Walkthrough Guide

ePolicy Orchestrator® 3.6 Walkthrough Guide Advanced Feature EvaluationsePolicy Orchestrator Notification

9

1 Click Notifications in the console tree, then select the Configuration | Basic Configuration tab in the details pane.

2 Under E-mail Server, type the name of a mail server to which the ePolicy Orchestrator server can route, and the desired e-mail address that you want to appear in the From line of the message.

3 Click Apply, then click E-mail Contacts at the top of the tab. This page allows you to specify all of the addresses to include in the address book from which you will select recipients during rule creation.

There should be one contact in the list already, Administrator. The e-mail address provided for Administrator is the e-mail address you entered in the Set E-mail Address panel of the installation wizard. If you did not change the default address in the wizard, the address is [email protected]. If the address for Administrator is one that you are not able to view the mail sent to it, then click the address and change it to one at which you can receive and view e-mail messages.

Now that you’ve specified an e-mail server to be used to send the message, and an address to receive the message, you are ready to create a rule to trigger on a VirusScan Enterprise event.

Figure 9-1 Basic Configuration

Note

When you decide which e-mail address to place here you should consider the number of administrators who may receive notification messages, and whether you want these administrators to be able to send reply messages.

Note

From the Configuration tab you can also define SNMP servers at which you’d like to receive SNMP traps and external commands that you want to run when certain events are received. These tasks are beyond the scope of this guide. For more information, see the ePolicy Orchestrator 3.6 Product Guide.

115

Page 119: Walkthrough Guide

ePolicy Orchestrator® 3.6 Walkthrough Guide Advanced Feature EvaluationsePolicy Orchestrator Notification

9

S T E P

2 Create a rule for any VirusScan Enterprise eventYou can create a variety of rules to handle nearly any category of events that are received from your managed security products. For more information, see the ePolicy Orchestrator 3.6 Product Guide.

1 Click the Rules tab, then click Add Rule to begin the Add or Edit Notification Rule wizard.

2 On the Describe Rule page, leave the default (Directory) for the Defined At text box. You can define rules for the Directory or any site within the Directory.

3 Provide a name for the rule in the Rule Name text box. For example, Virus Detected.

4 Provide a description of the rule in the Description text box. For example, Viruses detected by VirusScan Enterprise, then click Next.

5 On the Set Filters page:

a Leave all Operating systems checkboxes selected.

b Under Products, select VirusScan.

c Under Categories, select Any category above the list, then click Next.

So far the configurations you’ve made specify the rule to apply to any VirusScan event occurring on any managed system within the Directory.

Figure 9-2 Set Filters page

116

Page 120: Walkthrough Guide

ePolicy Orchestrator® 3.6 Walkthrough Guide Advanced Feature EvaluationsePolicy Orchestrator Notification

9

6 Although for this task you will leave the defaults on this page selected, the Set Thresholds page allows you to limit the number of notification messages you receive for the rule. For example, you can define any rule to send you messages only when the number of events or the number of affected systems have reached a specified number within a specified time frame (Aggregation). You can further limit the number of messages that are sent by specifying an amount of time to take place before receiving another message (Throttling). Throttling is almost always recommended by McAfee to prevent a flood of messages during an outbreak situation.

Leave Send a notification for every event selected, and click Next.

7 On the Create Notifications page, click Add E-mail Message.

8 Click Administrator in the box on the left of the page, then click To so that Administrator moves to the Notification Recipient(s) box.

This specifies that the e-mail address you configured (for the Administrator contact) is sent the notification message you are about to configure.

9 Type a Subject for the e-mail that will be sent to Administrator when this rule is triggered. For example, Threat detected by VirusScan.

10 Type a Body for the e-mail message that will be sent when this rule is triggered. For example, VirusScan detected a threat.

11 By inserting multiple variables into the body of the message, you can have meaningful information from the event files inserted into your notification message.

For the purpose of this section of the guide, select Affected computer names and click Body. This will place the name of the affected system, if available from the event file, in the body of the e-mail message. Click Save.

You can create multiple messages in multiple formats to send to multiple recipients, as well as choosing external commands to run, from the Create Notifications page. These are beyond the scope of this document. See the ePolicy Orchestrator 3.6 Product Guide for more information.

12 Click Next and verify the configurations you made to the rule you created on the View Summary page, then click Finish.

Figure 9-3 Set Thresholds page

117

Page 121: Walkthrough Guide

ePolicy Orchestrator® 3.6 Walkthrough Guide Advanced Feature EvaluationsRogue System Detection

9

S T E P

3 Providing a sample virus detectionNow that you have configured the feature and created a rule to trigger on event files from VirusScan Enterprise, you are ready to provide an event file that triggers the rule.

1 Download EICAR.COM to one of the workstation test systems. Each time you download this file, you are creating a sample detection, At press time, this file was available on the EICAR.ORG web site:

http://www.eicar.org/anti_virus_test_file.htm

2 The on-access scanner detects and quarantines the EICAR test virus at the same time that EICAR.COM is downloaded, and an event file capturing this information is sent to the ePolicy Orchestrator server.

3 Within minutes a notification message is created and sent to the inbox of the e-mail message recipient you provided earlier.

Congratulations! You successfully configured the product to send messages to a specific individual, created a rule to send a notification message based on events from VirusScan Enterprise, and tested the rule to ensure that it works.

Rogue System DetectionIn any managed network, at any given time, there are inevitably a small number of systems that do not have an ePolicy Orchestrator agent on them. These can be systems that frequently log on and off the network, such as test servers, laptop systems, or wireless devices. End users also uninstall or disable agents on their workstations. These unprotected systems are the Achilles heel of any anti-virus and security strategy and are the entry points by which viruses and other potentially harmful programs can gain access to your network.

The Rogue System Detection system helps you monitor all the systems on your network—not only the ones ePolicy Orchestrator manages already, but the rogue systems as well. A rogue system is any system that is not currently managed by an ePolicy Orchestrator agent but should be. Rogue System Detection integrates with your ePolicy Orchestrator server to provide real-time detection of rogue systems by means of a sensor placed on each network broadcast segment. The sensor listens to network broadcast messages and spots when a new system has connected to the network.

When the sensor detects a new system on the network, it sends a message to the Rogue System Detection server. The Rogue System Detection server then checks with the ePolicy Orchestrator server to determine whether the newly-identified system has an active agent installed and is managed by ePolicy Orchestrator. If the new system is unknown to ePolicy Orchestrator, Rogue System Detection allows you to take any number of remediation steps, including alerting network and anti-virus administrators or automatically deploying an ePolicy Orchestrator agent to the system.

Note

This file is not a virus.

118

Page 122: Walkthrough Guide

ePolicy Orchestrator® 3.6 Walkthrough Guide Advanced Feature EvaluationsRogue System Detection

9

In this section, you will:

1 Configure Rogue System Detection sensor policy.

2 Deploy the Rogue System Detection sensor

3 Configure an automatic response.

4 Rogue detection and remediation.

S T E P

4 Configure Rogue System Detection sensor policyBefore deploying the Rogue System Detection sensor, you should first configure the sensor policy.

Once the sensor is deployed to a system in your environment, it requires one agent-to-server communication and one policy enforcement interval before it is functioning in the environment. The agent-to-server communication installs the sensor on the system in a disabled state. Then the policy enforcement retrieves policy, including security certificates. These certificates are needed by the sensor to communicate to the server directly.

The following configuration changes to the sensor policy speed up this process for this purpose of this guide.

1 In the console tree, select Directory.

2 In the details pane, select the Policy tab, then select Rogue System Sensor 1.0.0.

3 Click Edit at the right end of the Configuration row.

4 Select New Policy from the Policy Name drop-down list. The Create new policy dialog box appears.

5 Provide a New policy name for the policy (for example, Sensor1), then click OK. The Policy Settings dialog box appears.

6 On the General tab, deselect Inherit, then under Communication Intervals make the following changes:

a Set Minimum reporting interval for each detected host to 120 seconds.

b Set Minimum sensor-to-server communication interval for primary sensors to 5 seconds.

7 Click Apply All, then click Close. The new policy is created.

8 Click Apply at the end of the Configuration row on the Assign Policies page to assign the new policy to the site selected in the console tree.

Note

These specific configurations to the sensor policy are only for the purpose of the evaluation. These are not recommended configurations for a production environment deployment of the sensor.

119

Page 123: Walkthrough Guide

ePolicy Orchestrator® 3.6 Walkthrough Guide Advanced Feature EvaluationsRogue System Detection

9

S T E P

5 Deploy the Rogue System Detection sensorThe sensor is the distributed portion of the Rogue System Detection architecture. Sensors detect the systems, routers, printers, and other network devices connected to your network. The sensor gathers information about the devices it detects, and forwards the information on to the Rogue System Detection server.

The sensor is a small Win32 native executable application. Similar to an ePolicy Orchestrator SuperAgent, you must deploy at least one sensor to each broadcast segment, usually the same as a network subnet, in your network. The sensor runs on any NT-based Windows operating system, such as Windows 2000, Windows XP, or Windows 2003.

For more information about the sensor and how it functions, see Chapter 11: Rogue System Detection in the ePolicy Orchestrator 3.6 Product Guide.

Depending on how you have your test environment set up, you may have more than one subnet represented in it. But you do have at least one.

To deploy the sensor:

1 In the console tree, select Rogue System Detection.

2 In the details pane, select the Subnets tab to display the Subnet List.

3 Select the subnets to which you want to deploy sensors by clicking once in the checkbox for that subnet, then click Deploy Sensors.

4 When the Sensor Deployment: Set Preferences page appears, ensure Let me select machines manually is selected.

5 Although we are not setting criteria for ePolicy Orchestrator to use to deploy sensors automatically, the availability of this criteria allows you to save time when trying to decide on which systems to install the sensors. This way, ePolicy Orchestrator finds the best systems on each subnet to install the sensors.

Figure 9-4 Subnet List page

120

Page 124: Walkthrough Guide

ePolicy Orchestrator® 3.6 Walkthrough Guide Advanced Feature EvaluationsRogue System Detection

9

6 Click Next, then select the checkbox next to the desired system to which you want to deploy a sensor, click Mark for Deployment, then click Next.The Sensor Deployment: Review and Approve page appears.

7 Click Finish. The Action Progress page of the Events tab displays, indicating the progress of each sensor deployment.

8 Remember that you must wait until after one agent-to-server communication and one policy enforcement interval before the sensor calls into the server and is functioning. This can be expedited by sending agent wakeup calls:

a In the console tree, right-click the system on which you installed the sensor, then select Agent Wakeup Call.

b Set Agent randomization to 0, then click OK.

c Wait two minutes, then repeat.

9 Once the Action Status is Completed Successfully, the sensor has called back to the server and is functioning.

10 Select the Machines tab and select Summary to view a summary of detected systems.

Now that the sensor is deployed and installed you are ready to configure a response for the feature to take on a rogue when one is detected.

S T E P

6 Configure an automatic responseYou can configure automatic responses for ePolicy Orchestrator to execute on rogue systems that are detected. There is a considerable amount of flexibility within this feature regarding the level of granularity available when defining the actions to take, and the conditions you can add to them. For complete information, see the ePolicy Orchestrator 3.6 Product Guide.

There are many situations where you may not want an automatic response to be taken. You can also set conditions around types of rogues where no actions are taken, or where the detected systems are simply marked for action.

For the purposes of this guide, you will configure a response that deploys an agent onto the rogue system once it has been discovered.

1 Select Rogue System Detection in the console tree, then select the Responses tab in the details pane.

2 Select the checkbox next to the default Query ePO Agent response, select Disable from the Checked responses drop-down list, then click Apply.

121

Page 125: Walkthrough Guide

ePolicy Orchestrator® 3.6 Walkthrough Guide Advanced Feature EvaluationsRogue System Detection

9

This response checks the detected system for an agent of another ePolicy Orchestrator server.

3 Click Add Automatic Response to display the Add or Edit Automatic Response page.

4 Type a name for the response. For example, Push Agent.

5 Under Conditions, click Add Condition, then select Rogue Type from the Property list.

6 Select is for the Comparison, and No Agent for the Value.

7 Under Actions, change the default Send E-mail action to Push ePO Agent as the Method, and accept the default Parameters.

8 Click OK.

9 Select the checkbox next to the Push Agent automatic response when the Automatic Responses page reappears. Select Enable from the Checked responses drop-down list, then click Apply.

Now that the sensor is deployed, and a response has been created and enabled to handle rogues with no agent, you are ready to introduce such a rogue.

Figure 9-5 Automatic Responses page

Figure 9-6 Add or Edit Automatic Response page

122

Page 126: Walkthrough Guide

ePolicy Orchestrator® 3.6 Walkthrough Guide Advanced Feature EvaluationsRogue System Detection

9

S T E P

7 Rogue detection and remediationNow you need to introduce a system into the test environment that does not have an agent. You can do this by several methods, such as joining a laptop to the test network, or by moving a system from an outside domain to the test domain you created earlier.

1 Add a system that does not have an ePolicy Orchestrator agent to the test network.

2 Go to the Machine tab, then click List. Once the sensor has detected a rogue system, it reports back to the server and places the system in the Machine List.

3 Once it appears in this list, take a five minute break to provide time for the agent installation.

4 Once the agent installation completes, the system has a Rogue Type of Managed.

You are not finished yet. You still must place the now managed system into its appropriate home in the Directory.

5 Once the system’s Rogue Type changes to Managed, it is placed in Directory | Lost&Found | Rogue Systems of the console tree.

The Lost&Found group is a holding place for systems ePolicy Orchestrator has discovered, but doesn’t know where to place within the Directory.

6 Click and drag the system to the desired site or group in your ePolicy Orchestrator Directory.

Congratulations! You successfully configured the sensor, deployed the sensor, configured an automatic response which you saw taken on the rogue you introduced, and placed the newly managed system into its appropriate spot in the Directory.

123